ALASKERNEL-5.4-2022-011


Amazon Linux 2 Security Advisory: ALASKERNEL-5.4-2022-011
Advisory Release Date: 2022-01-20 19:15 Pacific
Advisory Updated Date: 2024-05-23 23:02 Pacific
Severity: Important

Issue Overview:

2024-05-23: CVE-2020-9391 was added to this advisory.

2024-05-09: CVE-2019-19769 was added to this advisory.

2023-11-29: CVE-2020-27418 was added to this advisory.

In the Linux kernel 5.3.10, there is a use-after-free (read) in the perf_trace_lock_acquire function (related to include/trace/events/lock.h). (CVE-2019-19769)

A NULL pointer dereference flaw was found in the Linux kernel's SELinux subsystem. This flaw occurs while importing the Commercial IP Security Option (CIPSO) protocol's category bitmap into the SELinux extensible bitmap via the' ebitmap_netlbl_import' routine. While processing the CIPSO restricted bitmap tag in the 'cipso_v4_parsetag_rbm' routine, it sets the security attribute to indicate that the category bitmap is present, even if it has not been allocated. This issue leads to a NULL pointer dereference issue while importing the same category bitmap into SELinux. This flaw allows a remote network user to crash the system kernel, resulting in a denial of service. (CVE-2020-10711)

A Use After Free vulnerability in Fedora Linux kernel 5.9.0-rc9 allows attackers to obatin sensitive information via vgacon_invert_region() function. (CVE-2020-27418)

An issue was discovered in the Linux kernel 5.4 and 5.5 through 5.5.6 on the AArch64 architecture. It ignores the top byte in the address passed to the brk system call, potentially moving the memory break downwards when the application expects it to move upwards, aka CID-dcde237319e6. This has been observed to cause heap corruption with the GNU C Library malloc implementation. (CVE-2020-9391)


Affected Packages:

kernel


Note:

This advisory is applicable to Amazon Linux 2 - Kernel-5.4 Extra. Visit this page to learn more about Amazon Linux 2 (AL2) Extras and this FAQ section for the difference between AL2 Core and AL2 Extras advisories.


Issue Correction:
Run yum update kernel to update your system.

New Packages:
aarch64:
    kernel-5.4.38-17.76.amzn2.aarch64
    kernel-headers-5.4.38-17.76.amzn2.aarch64
    kernel-debuginfo-common-aarch64-5.4.38-17.76.amzn2.aarch64
    perf-5.4.38-17.76.amzn2.aarch64
    perf-debuginfo-5.4.38-17.76.amzn2.aarch64
    python-perf-5.4.38-17.76.amzn2.aarch64
    python-perf-debuginfo-5.4.38-17.76.amzn2.aarch64
    kernel-tools-5.4.38-17.76.amzn2.aarch64
    kernel-tools-devel-5.4.38-17.76.amzn2.aarch64
    kernel-tools-debuginfo-5.4.38-17.76.amzn2.aarch64
    kernel-devel-5.4.38-17.76.amzn2.aarch64
    kernel-debuginfo-5.4.38-17.76.amzn2.aarch64

i686:
    kernel-headers-5.4.38-17.76.amzn2.i686

src:
    kernel-5.4.38-17.76.amzn2.src

x86_64:
    kernel-5.4.38-17.76.amzn2.x86_64
    kernel-headers-5.4.38-17.76.amzn2.x86_64
    kernel-debuginfo-common-x86_64-5.4.38-17.76.amzn2.x86_64
    perf-5.4.38-17.76.amzn2.x86_64
    perf-debuginfo-5.4.38-17.76.amzn2.x86_64
    python-perf-5.4.38-17.76.amzn2.x86_64
    python-perf-debuginfo-5.4.38-17.76.amzn2.x86_64
    kernel-tools-5.4.38-17.76.amzn2.x86_64
    kernel-tools-devel-5.4.38-17.76.amzn2.x86_64
    kernel-tools-debuginfo-5.4.38-17.76.amzn2.x86_64
    kernel-devel-5.4.38-17.76.amzn2.x86_64
    kernel-debuginfo-5.4.38-17.76.amzn2.x86_64