Amazon Linux 2 Security Advisory: ALASKERNEL-5.4-2022-011
Advisory Release Date: 2022-01-20 19:15 Pacific
Advisory Updated Date: 2024-05-23 23:02 Pacific
FAQs regarding Amazon Linux ALAS/CVE Severity
2024-05-23: CVE-2020-9391 was added to this advisory.
2024-05-09: CVE-2019-19769 was added to this advisory.
2023-11-29: CVE-2020-27418 was added to this advisory.
In the Linux kernel 5.3.10, there is a use-after-free (read) in the perf_trace_lock_acquire function (related to include/trace/events/lock.h). (CVE-2019-19769)
A NULL pointer dereference flaw was found in the Linux kernel's SELinux subsystem. This flaw occurs while importing the Commercial IP Security Option (CIPSO) protocol's category bitmap into the SELinux extensible bitmap via the' ebitmap_netlbl_import' routine. While processing the CIPSO restricted bitmap tag in the 'cipso_v4_parsetag_rbm' routine, it sets the security attribute to indicate that the category bitmap is present, even if it has not been allocated. This issue leads to a NULL pointer dereference issue while importing the same category bitmap into SELinux. This flaw allows a remote network user to crash the system kernel, resulting in a denial of service. (CVE-2020-10711)
A Use After Free vulnerability in Fedora Linux kernel 5.9.0-rc9 allows attackers to obatin sensitive information via vgacon_invert_region() function. (CVE-2020-27418)
An issue was discovered in the Linux kernel 5.4 and 5.5 through 5.5.6 on the AArch64 architecture. It ignores the top byte in the address passed to the brk system call, potentially moving the memory break downwards when the application expects it to move upwards, aka CID-dcde237319e6. This has been observed to cause heap corruption with the GNU C Library malloc implementation. (CVE-2020-9391)
Affected Packages:
kernel
Note:
This advisory is applicable to Amazon Linux 2 - Kernel-5.4 Extra. Visit this page to learn more about Amazon Linux 2 (AL2) Extras and this FAQ section for the difference between AL2 Core and AL2 Extras advisories.
Issue Correction:
Run yum update kernel to update your system.
aarch64:
kernel-5.4.38-17.76.amzn2.aarch64
kernel-headers-5.4.38-17.76.amzn2.aarch64
kernel-debuginfo-common-aarch64-5.4.38-17.76.amzn2.aarch64
perf-5.4.38-17.76.amzn2.aarch64
perf-debuginfo-5.4.38-17.76.amzn2.aarch64
python-perf-5.4.38-17.76.amzn2.aarch64
python-perf-debuginfo-5.4.38-17.76.amzn2.aarch64
kernel-tools-5.4.38-17.76.amzn2.aarch64
kernel-tools-devel-5.4.38-17.76.amzn2.aarch64
kernel-tools-debuginfo-5.4.38-17.76.amzn2.aarch64
kernel-devel-5.4.38-17.76.amzn2.aarch64
kernel-debuginfo-5.4.38-17.76.amzn2.aarch64
i686:
kernel-headers-5.4.38-17.76.amzn2.i686
src:
kernel-5.4.38-17.76.amzn2.src
x86_64:
kernel-5.4.38-17.76.amzn2.x86_64
kernel-headers-5.4.38-17.76.amzn2.x86_64
kernel-debuginfo-common-x86_64-5.4.38-17.76.amzn2.x86_64
perf-5.4.38-17.76.amzn2.x86_64
perf-debuginfo-5.4.38-17.76.amzn2.x86_64
python-perf-5.4.38-17.76.amzn2.x86_64
python-perf-debuginfo-5.4.38-17.76.amzn2.x86_64
kernel-tools-5.4.38-17.76.amzn2.x86_64
kernel-tools-devel-5.4.38-17.76.amzn2.x86_64
kernel-tools-debuginfo-5.4.38-17.76.amzn2.x86_64
kernel-devel-5.4.38-17.76.amzn2.x86_64
kernel-debuginfo-5.4.38-17.76.amzn2.x86_64