Amazon Linux 2 Security Advisory: ALASKERNEL-5.4-2022-024
Advisory Release Date: 2022-04-04 23:40 Pacific
Advisory Updated Date: 2024-12-05 01:00 Pacific
FAQs regarding Amazon Linux ALAS/CVE Severity
2024-12-05: CVE-2022-48850 was added to this advisory.
2024-09-12: CVE-2022-48912 was added to this advisory.
2024-09-12: CVE-2022-48919 was added to this advisory.
2024-08-27: CVE-2022-48843 was added to this advisory.
2024-08-27: CVE-2022-48855 was added to this advisory.
2024-08-27: CVE-2022-48858 was added to this advisory.
2024-05-23: CVE-2021-47088 was added to this advisory.
2024-04-25: CVE-2021-46937 was added to this advisory.
In the Linux kernel, the following vulnerability has been resolved:
mm/damon/dbgfs: fix 'struct pid' leaks in 'dbgfs_target_ids_write()' (CVE-2021-46937)
In the Linux kernel, the following vulnerability has been resolved:
mm/damon/dbgfs: protect targets destructions with kdamond_lock (CVE-2021-47088)
A flaw was found in the Linux kernel in linux/net/netfilter/nf_tables_api.c of the netfilter subsystem. This flaw allows a local user to cause an out-of-bounds write issue. (CVE-2022-1015)
A flaw was found in the Linux kernel in net/netfilter/nf_tables_core.c:nft_do_chain, which can cause a use-after-free. This issue needs to handle return with proper preconditions, as it can lead to a kernel information leak problem caused by a local, unprivileged attacker. (CVE-2022-1016)
A use-after-free vulnerability was found in the tc_new_tfilter function in net/sched/cls_api.c in the Linux kernel. The availability of local, unprivileged user namespaces allows privilege escalation. (CVE-2022-1055)
An out-of-bounds (OOB) memory access flaw was found in nft_fwd_dup_netdev_offload in net/netfilter/nf_dup_netdev.c in the netfilter subcomponent in the Linux kernel due to a heap out-of-bounds write problem. This flaw allows a local attacker with a user account on the system to gain access to out-of-bounds memory, leading to a system crash or a privilege escalation threat. (CVE-2022-25636)
In the Linux kernel, the following vulnerability has been resolved:
drm/vrr: Set VRR capable prop only if it is attached to connector (CVE-2022-48843)
In the Linux kernel, the following vulnerability has been resolved:
net-sysfs: add check for netdevice being present to speed_show (CVE-2022-48850)
In the Linux kernel, the following vulnerability has been resolved:
sctp: fix kernel-infoleak for SCTP sockets (CVE-2022-48855)
In the Linux kernel, the following vulnerability has been resolved:
net/mlx5: Fix a race on command flush flow (CVE-2022-48858)
In the Linux kernel, the following vulnerability has been resolved:
netfilter: fix use-after-free in __nf_register_net_hook() (CVE-2022-48912)
In the Linux kernel, the following vulnerability has been resolved:
cifs: fix double free race when mount fails in cifs_get_root() (CVE-2022-48919)
Affected Packages:
kernel
Note:
This advisory is applicable to Amazon Linux 2 - Kernel-5.4 Extra. Visit this page to learn more about Amazon Linux 2 (AL2) Extras and this FAQ section for the difference between AL2 Core and AL2 Extras advisories.
Issue Correction:
Run yum update kernel to update your system.
aarch64:
kernel-5.4.186-102.354.amzn2.aarch64
kernel-headers-5.4.186-102.354.amzn2.aarch64
kernel-debuginfo-common-aarch64-5.4.186-102.354.amzn2.aarch64
perf-5.4.186-102.354.amzn2.aarch64
perf-debuginfo-5.4.186-102.354.amzn2.aarch64
python-perf-5.4.186-102.354.amzn2.aarch64
python-perf-debuginfo-5.4.186-102.354.amzn2.aarch64
kernel-tools-5.4.186-102.354.amzn2.aarch64
kernel-tools-devel-5.4.186-102.354.amzn2.aarch64
kernel-tools-debuginfo-5.4.186-102.354.amzn2.aarch64
bpftool-5.4.186-102.354.amzn2.aarch64
bpftool-debuginfo-5.4.186-102.354.amzn2.aarch64
kernel-devel-5.4.186-102.354.amzn2.aarch64
kernel-debuginfo-5.4.186-102.354.amzn2.aarch64
i686:
kernel-headers-5.4.186-102.354.amzn2.i686
src:
kernel-5.4.186-102.354.amzn2.src
x86_64:
kernel-5.4.186-102.354.amzn2.x86_64
kernel-headers-5.4.186-102.354.amzn2.x86_64
kernel-debuginfo-common-x86_64-5.4.186-102.354.amzn2.x86_64
perf-5.4.186-102.354.amzn2.x86_64
perf-debuginfo-5.4.186-102.354.amzn2.x86_64
python-perf-5.4.186-102.354.amzn2.x86_64
python-perf-debuginfo-5.4.186-102.354.amzn2.x86_64
kernel-tools-5.4.186-102.354.amzn2.x86_64
kernel-tools-devel-5.4.186-102.354.amzn2.x86_64
kernel-tools-debuginfo-5.4.186-102.354.amzn2.x86_64
bpftool-5.4.186-102.354.amzn2.x86_64
bpftool-debuginfo-5.4.186-102.354.amzn2.x86_64
kernel-devel-5.4.186-102.354.amzn2.x86_64
kernel-debuginfo-5.4.186-102.354.amzn2.x86_64