QID 353960
Date Published: 2022-06-13
QID 353960: Amazon Linux Security Advisory for kernel : ALAS2KERNEL-5.10-2022-014
A kernel information leak flaw was identified in the scsi_ioctl function in drivers/scsi/scsi_ioctl.c in the linux kernel.
This flaw allows a local attacker with a special user privilege (cap_sys_admin or cap_sys_rawio) to create issues with confidentiality. (
( CVE-2022-0494) a memory leak flaw was found in the linux kernel's dma subsystem, in the way a user calls dma_from_device.
This flaw allows a local user to read random memory from the kernel space. (
( CVE-2022-0854) perf: fix sys_perf_event_open() race against self (cve-2022-1729) io_uring: always use original task when preparing req identity (cve-2022-1786) the sunrpc subsystem in the linux kernel through 5.17.2 can call xs_xprt_free before ensuring that sockets are in the intended state. (
( CVE-2022-28893) improper update of reference count vulnerability in net/sched of linux kernel allows local attacker to cause privilege escalation to root.
This issue affects: linux kernel versions prior to 5.18; version 4.14 and later versions. (
( CVE-2022-29581)
Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
Successful exploitation of this vulnerability could lead to a securitybreach or could affect integrity, availability, and confidentiality.
- ALAS2KERNEL-5.10-2022-014 -
alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2022-014.html
CVEs related to QID 353960
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| ALAS2KERNEL-5.10-2022-014 | Amazon Linux 2 |
|