7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.2 High
AI Score
Confidence
High
4.9 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:N/I:N/A:C
0.0004 Low
EPSS
Percentile
11.9%
Issue Overview:
A use-after-free flaw was found in the Linux kernel’s FUSE filesystem in the way a user triggers write(). This flaw allows a local user to gain unauthorized access to data from the FUSE filesystem, resulting in privilege escalation. (CVE-2022-1011)
A vulnerability was found in the pfkey_register function in net/key/af_key.c in the Linux kernel. This flaw allows a local, unprivileged user to gain access to kernel memory, leading to a system crash or a leak of internal kernel information. (CVE-2022-1353)
A NULL pointer dereference flaw was found in the Linux kernel’s X.25 set of standardized network protocols functionality in the way a user terminates their session using a simulated Ethernet card and continued usage of this connection. This flaw allows a local user to crash the system. (CVE-2022-1516)
mcba_usb_start_xmit in drivers/net/can/usb/mcba_usb.c in the Linux kernel through 5.17.1 has a double free. (CVE-2022-28389)
A double-free flaw was found in the Linux kernel in the ems_usb_start_xmit function. This flaw allows an attacker to create a memory leak and corrupt the underlying data structure by calling free more than once. (CVE-2022-28390)
Affected Packages:
kernel
Note:
This advisory is applicable to Amazon Linux 2 (AL2) Core repository. Visit this FAQ section for the difference between AL2 Core and AL2 Extras advisories.
Issue Correction:
Run yum update kernel to update your system.
New Packages:
aarch64:
kernel-4.14.276-211.499.amzn2.aarch64
kernel-headers-4.14.276-211.499.amzn2.aarch64
kernel-debuginfo-common-aarch64-4.14.276-211.499.amzn2.aarch64
perf-4.14.276-211.499.amzn2.aarch64
perf-debuginfo-4.14.276-211.499.amzn2.aarch64
python-perf-4.14.276-211.499.amzn2.aarch64
python-perf-debuginfo-4.14.276-211.499.amzn2.aarch64
kernel-tools-4.14.276-211.499.amzn2.aarch64
kernel-tools-devel-4.14.276-211.499.amzn2.aarch64
kernel-tools-debuginfo-4.14.276-211.499.amzn2.aarch64
kernel-devel-4.14.276-211.499.amzn2.aarch64
kernel-debuginfo-4.14.276-211.499.amzn2.aarch64
i686:
kernel-headers-4.14.276-211.499.amzn2.i686
src:
kernel-4.14.276-211.499.amzn2.src
x86_64:
kernel-4.14.276-211.499.amzn2.x86_64
kernel-headers-4.14.276-211.499.amzn2.x86_64
kernel-debuginfo-common-x86_64-4.14.276-211.499.amzn2.x86_64
perf-4.14.276-211.499.amzn2.x86_64
perf-debuginfo-4.14.276-211.499.amzn2.x86_64
python-perf-4.14.276-211.499.amzn2.x86_64
python-perf-debuginfo-4.14.276-211.499.amzn2.x86_64
kernel-tools-4.14.276-211.499.amzn2.x86_64
kernel-tools-devel-4.14.276-211.499.amzn2.x86_64
kernel-tools-debuginfo-4.14.276-211.499.amzn2.x86_64
kernel-devel-4.14.276-211.499.amzn2.x86_64
kernel-debuginfo-4.14.276-211.499.amzn2.x86_64
kernel-livepatch-4.14.276-211.499-1.0-0.amzn2.x86_64
Red Hat: CVE-2022-1011, CVE-2022-1353, CVE-2022-1516, CVE-2022-28389, CVE-2022-28390, CVE-2023-1637
Mitre: CVE-2022-1011, CVE-2022-1353, CVE-2022-1516, CVE-2022-28389, CVE-2022-28390, CVE-2023-1637
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.2 High
AI Score
Confidence
High
4.9 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:N/I:N/A:C
0.0004 Low
EPSS
Percentile
11.9%