Lucene search

K
amazonAmazonALAS2-2022-1793
HistoryMay 04, 2022 - 1:01 a.m.

Medium: kernel

2022-05-0401:01:00
alas.aws.amazon.com
38

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.2 High

AI Score

Confidence

High

4.9 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:N/I:N/A:C

0.0004 Low

EPSS

Percentile

11.9%

Issue Overview:

A use-after-free flaw was found in the Linux kernel’s FUSE filesystem in the way a user triggers write(). This flaw allows a local user to gain unauthorized access to data from the FUSE filesystem, resulting in privilege escalation. (CVE-2022-1011)

A vulnerability was found in the pfkey_register function in net/key/af_key.c in the Linux kernel. This flaw allows a local, unprivileged user to gain access to kernel memory, leading to a system crash or a leak of internal kernel information. (CVE-2022-1353)

A NULL pointer dereference flaw was found in the Linux kernel’s X.25 set of standardized network protocols functionality in the way a user terminates their session using a simulated Ethernet card and continued usage of this connection. This flaw allows a local user to crash the system. (CVE-2022-1516)

mcba_usb_start_xmit in drivers/net/can/usb/mcba_usb.c in the Linux kernel through 5.17.1 has a double free. (CVE-2022-28389)

A double-free flaw was found in the Linux kernel in the ems_usb_start_xmit function. This flaw allows an attacker to create a memory leak and corrupt the underlying data structure by calling free more than once. (CVE-2022-28390)

Affected Packages:

kernel

Note:

This advisory is applicable to Amazon Linux 2 (AL2) Core repository. Visit this FAQ section for the difference between AL2 Core and AL2 Extras advisories.

Issue Correction:
Run yum update kernel to update your system.

New Packages:

aarch64:  
    kernel-4.14.276-211.499.amzn2.aarch64  
    kernel-headers-4.14.276-211.499.amzn2.aarch64  
    kernel-debuginfo-common-aarch64-4.14.276-211.499.amzn2.aarch64  
    perf-4.14.276-211.499.amzn2.aarch64  
    perf-debuginfo-4.14.276-211.499.amzn2.aarch64  
    python-perf-4.14.276-211.499.amzn2.aarch64  
    python-perf-debuginfo-4.14.276-211.499.amzn2.aarch64  
    kernel-tools-4.14.276-211.499.amzn2.aarch64  
    kernel-tools-devel-4.14.276-211.499.amzn2.aarch64  
    kernel-tools-debuginfo-4.14.276-211.499.amzn2.aarch64  
    kernel-devel-4.14.276-211.499.amzn2.aarch64  
    kernel-debuginfo-4.14.276-211.499.amzn2.aarch64  
  
i686:  
    kernel-headers-4.14.276-211.499.amzn2.i686  
  
src:  
    kernel-4.14.276-211.499.amzn2.src  
  
x86_64:  
    kernel-4.14.276-211.499.amzn2.x86_64  
    kernel-headers-4.14.276-211.499.amzn2.x86_64  
    kernel-debuginfo-common-x86_64-4.14.276-211.499.amzn2.x86_64  
    perf-4.14.276-211.499.amzn2.x86_64  
    perf-debuginfo-4.14.276-211.499.amzn2.x86_64  
    python-perf-4.14.276-211.499.amzn2.x86_64  
    python-perf-debuginfo-4.14.276-211.499.amzn2.x86_64  
    kernel-tools-4.14.276-211.499.amzn2.x86_64  
    kernel-tools-devel-4.14.276-211.499.amzn2.x86_64  
    kernel-tools-debuginfo-4.14.276-211.499.amzn2.x86_64  
    kernel-devel-4.14.276-211.499.amzn2.x86_64  
    kernel-debuginfo-4.14.276-211.499.amzn2.x86_64  
    kernel-livepatch-4.14.276-211.499-1.0-0.amzn2.x86_64  

Additional References

Red Hat: CVE-2022-1011, CVE-2022-1353, CVE-2022-1516, CVE-2022-28389, CVE-2022-28390, CVE-2023-1637

Mitre: CVE-2022-1011, CVE-2022-1353, CVE-2022-1516, CVE-2022-28389, CVE-2022-28390, CVE-2023-1637

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

7.2 High

AI Score

Confidence

High

4.9 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:N/I:N/A:C

0.0004 Low

EPSS

Percentile

11.9%