QID 353159

Date Published: 2022-02-01

QID 353159: Amazon Linux Security Advisory for kernel : ALAS2KERNEL-5.10-2022-001

a use-after-free flaw was found in the linux kernels nfc llcp protocol implementation in the way the user performs manipulation with an unknown input for the llcp_sock_bind() function.
This flaw allows a local user to crash or escalate their privileges on the system. (
( CVE-2020-25670) a use-after-free flaw was found in the linux kernels nfc llcp protocol implementation in the way the user triggers the llcp_sock_connect() function.
This flaw allows a local user to crash the system. (
( CVE-2020-25671) a memory leak in the linux kernels nfc llcp protocol implementation was found in the way a user triggers the llcp_sock_connect() function.
This flaw allows a local user to starve the resources, causing a denial of service. (
( CVE-2020-25672) a vulnerability was found in linux kernel where non-blocking socket in llcp_sock_connect() leads to leak and eventually hanging-up the system. (
( CVE-2020-25673) a use-after-free flaw was found in the linux kernels sctp socket functionality that triggers a race condition.
This flaw allows a local user to escalate their privileges on the system.
The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability. (
( CVE-2021-23133) a vulnerability was discovered in retrieve_ptr_limit in kernel/bpf/verifier.c in the linux kernel mechanism to mitigate speculatively out-of-bounds loads (spectre mitigation).
In this flaw a local, special user privileged (cap_sys_admin) bpf program running on affected systems may bypass the protection, and execute speculatively out-of-bounds loads from the kernel memory.
This can be abused to extract contents of kernel memory via side-channel. (
( CVE-2021-3501)



Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

Successful exploitation of this vulnerability could lead to a securitybreach or could affect integrity, availability, and confidentiality.

  • CVSS V3 rated as Critical - 8.8 severity.
  • CVSS V2 rated as High - 7.2 severity.
  • Solution
    Please refer to Amazon advisory: ALAS2KERNEL-5.10-2022-001 for affected packages and patching details, or update with your package manager.
    Vendor References
    Software Advisories
    Advisory ID Software Component Link
    ALAS2KERNEL-5.10-2022-001 Amazon Linux 2 URL Logo alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2022-001.html