Lucene search

K
amazonAmazonALAS2-2022-1793
HistoryMay 04, 2022 - 1:01 a.m.

Medium: kernel

2022-05-0401:01:00
alas.aws.amazon.com
42
linux kernel
fuse filesystem
privilege escalation
pfkey_register function
kernel memory
x.25 protocol
system crash
mcba_usb_start_xmit
ems_usb_start_xmit

AI Score

7.2

Confidence

High

EPSS

0

Percentile

14.2%

Issue Overview:

A use-after-free flaw was found in the Linux kernel’s FUSE filesystem in the way a user triggers write(). This flaw allows a local user to gain unauthorized access to data from the FUSE filesystem, resulting in privilege escalation. (CVE-2022-1011)

A vulnerability was found in the pfkey_register function in net/key/af_key.c in the Linux kernel. This flaw allows a local, unprivileged user to gain access to kernel memory, leading to a system crash or a leak of internal kernel information. (CVE-2022-1353)

A NULL pointer dereference flaw was found in the Linux kernel’s X.25 set of standardized network protocols functionality in the way a user terminates their session using a simulated Ethernet card and continued usage of this connection. This flaw allows a local user to crash the system. (CVE-2022-1516)

mcba_usb_start_xmit in drivers/net/can/usb/mcba_usb.c in the Linux kernel through 5.17.1 has a double free. (CVE-2022-28389)

A double-free flaw was found in the Linux kernel in the ems_usb_start_xmit function. This flaw allows an attacker to create a memory leak and corrupt the underlying data structure by calling free more than once. (CVE-2022-28390)

Affected Packages:

kernel

Note:

This advisory is applicable to Amazon Linux 2 (AL2) Core repository. Visit this FAQ section for the difference between AL2 Core and AL2 Extras advisories.

Issue Correction:
Run yum update kernel to update your system.

New Packages:

aarch64:  
    kernel-4.14.276-211.499.amzn2.aarch64  
    kernel-headers-4.14.276-211.499.amzn2.aarch64  
    kernel-debuginfo-common-aarch64-4.14.276-211.499.amzn2.aarch64  
    perf-4.14.276-211.499.amzn2.aarch64  
    perf-debuginfo-4.14.276-211.499.amzn2.aarch64  
    python-perf-4.14.276-211.499.amzn2.aarch64  
    python-perf-debuginfo-4.14.276-211.499.amzn2.aarch64  
    kernel-tools-4.14.276-211.499.amzn2.aarch64  
    kernel-tools-devel-4.14.276-211.499.amzn2.aarch64  
    kernel-tools-debuginfo-4.14.276-211.499.amzn2.aarch64  
    kernel-devel-4.14.276-211.499.amzn2.aarch64  
    kernel-debuginfo-4.14.276-211.499.amzn2.aarch64  
  
i686:  
    kernel-headers-4.14.276-211.499.amzn2.i686  
  
src:  
    kernel-4.14.276-211.499.amzn2.src  
  
x86_64:  
    kernel-4.14.276-211.499.amzn2.x86_64  
    kernel-headers-4.14.276-211.499.amzn2.x86_64  
    kernel-debuginfo-common-x86_64-4.14.276-211.499.amzn2.x86_64  
    perf-4.14.276-211.499.amzn2.x86_64  
    perf-debuginfo-4.14.276-211.499.amzn2.x86_64  
    python-perf-4.14.276-211.499.amzn2.x86_64  
    python-perf-debuginfo-4.14.276-211.499.amzn2.x86_64  
    kernel-tools-4.14.276-211.499.amzn2.x86_64  
    kernel-tools-devel-4.14.276-211.499.amzn2.x86_64  
    kernel-tools-debuginfo-4.14.276-211.499.amzn2.x86_64  
    kernel-devel-4.14.276-211.499.amzn2.x86_64  
    kernel-debuginfo-4.14.276-211.499.amzn2.x86_64  
    kernel-livepatch-4.14.276-211.499-1.0-0.amzn2.x86_64  

Additional References

Red Hat: CVE-2022-1011, CVE-2022-1353, CVE-2022-1516, CVE-2022-28389, CVE-2022-28390, CVE-2023-1637

Mitre: CVE-2022-1011, CVE-2022-1353, CVE-2022-1516, CVE-2022-28389, CVE-2022-28390, CVE-2023-1637