ALASKERNEL-5.15-2022-005


Amazon Linux 2 Security Advisory: ALASKERNEL-5.15-2022-005
Advisory Release Date: 2022-07-19 16:02 Pacific
Advisory Updated Date: 2025-03-13 01:32 Pacific
Severity: Important

Issue Overview:

Linux disk/nic frontends data leaks T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Linux Block and Network PV device frontends don't zero memory regions before sharing them with the backend (CVE-2022-26365, CVE-2022-33740). Additionally the granularity of the grant table doesn't allow sharing less than a 4K page, leading to unrelated data residing in the same 4K page as data shared with a backend being accessible by such backend (CVE-2022-33741, CVE-2022-33742). (CVE-2022-26365)

Linux disk/nic frontends data leaks T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Linux Block and Network PV device frontends don't zero memory regions before sharing them with the backend (CVE-2022-26365, CVE-2022-33740). Additionally the granularity of the grant table doesn't allow sharing less than a 4K page, leading to unrelated data residing in the same 4K page as data shared with a backend being accessible by such backend (CVE-2022-33741, CVE-2022-33742). (CVE-2022-33740)

Linux disk/nic frontends data leaks T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Linux Block and Network PV device frontends don't zero memory regions before sharing them with the backend (CVE-2022-26365, CVE-2022-33740). Additionally the granularity of the grant table doesn't allow sharing less than a 4K page, leading to unrelated data residing in the same 4K page as data shared with a backend being accessible by such backend (CVE-2022-33741, CVE-2022-33742). (CVE-2022-33741)

Linux disk/nic frontends data leaks T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Linux Block and Network PV device frontends don't zero memory regions before sharing them with the backend (CVE-2022-26365, CVE-2022-33740). Additionally the granularity of the grant table doesn't allow sharing less than a 4K page, leading to unrelated data residing in the same 4K page as data shared with a backend being accessible by such backend (CVE-2022-33741, CVE-2022-33742). (CVE-2022-33742)

network backend may cause Linux netfront to use freed SKBs While adding logic to support XDP (eXpress Data Path), a code label was moved in a way allowing for SKBs having references (pointers) retained for further processing to nevertheless be freed. (CVE-2022-33743)

A heap buffer overflow flaw was found in the Linux kernel's Netfilter subsystem in the way a user provides incorrect input of the NFT_DATA_VERDICT type. This flaw allows a local user to crash or potentially escalate their privileges on the system. (CVE-2022-34918)

In the Linux kernel, the following vulnerability has been resolved:

ipv6: fix lockdep splat in in6_dump_addrs() (CVE-2022-49662)

In the Linux kernel, the following vulnerability has been resolved:

tunnels: do not assume mac header is set in skb_tunnel_check_pmtu() (CVE-2022-49663)

In the Linux kernel, the following vulnerability has been resolved:

net: bonding: fix use-after-free after 802.3ad slave unbind (CVE-2022-49667)

In the Linux kernel, the following vulnerability has been resolved:

dm raid: fix KASAN warning in raid5_add_disks (CVE-2022-49673)

In the Linux kernel, the following vulnerability has been resolved:

virtio_net: fix xdp_rxq_info bug after suspend/resume (CVE-2022-49687)

In the Linux kernel, the following vulnerability has been resolved:

erspan: do not assume transport header is always set (CVE-2022-49691)

In the Linux kernel, the following vulnerability has been resolved:

igb: fix a use-after-free issue in igb_clean_tx_ring (CVE-2022-49695)

In the Linux kernel, the following vulnerability has been resolved:

mm/slub: add missing TID updates on slab deactivation (CVE-2022-49700)


Affected Packages:

kernel


Note:

This advisory is applicable to Amazon Linux 2 - Kernel-5.15 Extra. Visit this page to learn more about Amazon Linux 2 (AL2) Extras and this FAQ section for the difference between AL2 Core and AL2 Extras advisories.


Issue Correction:
Run yum update kernel to update your system.

New Packages:
aarch64:
    kernel-5.15.54-25.126.amzn2.aarch64
    kernel-headers-5.15.54-25.126.amzn2.aarch64
    kernel-debuginfo-common-aarch64-5.15.54-25.126.amzn2.aarch64
    perf-5.15.54-25.126.amzn2.aarch64
    perf-debuginfo-5.15.54-25.126.amzn2.aarch64
    python-perf-5.15.54-25.126.amzn2.aarch64
    python-perf-debuginfo-5.15.54-25.126.amzn2.aarch64
    kernel-tools-5.15.54-25.126.amzn2.aarch64
    kernel-tools-devel-5.15.54-25.126.amzn2.aarch64
    kernel-tools-debuginfo-5.15.54-25.126.amzn2.aarch64
    bpftool-5.15.54-25.126.amzn2.aarch64
    bpftool-debuginfo-5.15.54-25.126.amzn2.aarch64
    kernel-devel-5.15.54-25.126.amzn2.aarch64
    kernel-debuginfo-5.15.54-25.126.amzn2.aarch64
    kernel-livepatch-5.15.54-25.126-1.0-0.amzn2.aarch64

i686:
    kernel-headers-5.15.54-25.126.amzn2.i686

src:
    kernel-5.15.54-25.126.amzn2.src

x86_64:
    kernel-5.15.54-25.126.amzn2.x86_64
    kernel-headers-5.15.54-25.126.amzn2.x86_64
    kernel-debuginfo-common-x86_64-5.15.54-25.126.amzn2.x86_64
    perf-5.15.54-25.126.amzn2.x86_64
    perf-debuginfo-5.15.54-25.126.amzn2.x86_64
    python-perf-5.15.54-25.126.amzn2.x86_64
    python-perf-debuginfo-5.15.54-25.126.amzn2.x86_64
    kernel-tools-5.15.54-25.126.amzn2.x86_64
    kernel-tools-devel-5.15.54-25.126.amzn2.x86_64
    kernel-tools-debuginfo-5.15.54-25.126.amzn2.x86_64
    bpftool-5.15.54-25.126.amzn2.x86_64
    bpftool-debuginfo-5.15.54-25.126.amzn2.x86_64
    kernel-devel-5.15.54-25.126.amzn2.x86_64
    kernel-debuginfo-5.15.54-25.126.amzn2.x86_64
    kernel-livepatch-5.15.54-25.126-1.0-0.amzn2.x86_64

Changelog:

2025-03-13: CVE-2022-49673 was added to this advisory.

2025-03-13: CVE-2022-49687 was added to this advisory.

2025-03-13: CVE-2022-49663 was added to this advisory.

2025-03-13: CVE-2022-49700 was added to this advisory.

2025-03-13: CVE-2022-49662 was added to this advisory.

2025-03-13: CVE-2022-49691 was added to this advisory.

2025-03-13: CVE-2022-49695 was added to this advisory.

2025-03-13: CVE-2022-49667 was added to this advisory.