QID 353960

Date Published: 2022-06-13

QID 353960: Amazon Linux Security Advisory for kernel : ALAS2KERNEL-5.10-2022-014

A kernel information leak flaw was identified in the scsi_ioctl function in drivers/scsi/scsi_ioctl.c in the linux kernel.
This flaw allows a local attacker with a special user privilege (cap_sys_admin or cap_sys_rawio) to create issues with confidentiality. (
( CVE-2022-0494) a memory leak flaw was found in the linux kernel's dma subsystem, in the way a user calls dma_from_device.
This flaw allows a local user to read random memory from the kernel space. (
( CVE-2022-0854) perf: fix sys_perf_event_open() race against self (cve-2022-1729) io_uring: always use original task when preparing req identity (cve-2022-1786) the sunrpc subsystem in the linux kernel through 5.17.2 can call xs_xprt_free before ensuring that sockets are in the intended state. (
( CVE-2022-28893) improper update of reference count vulnerability in net/sched of linux kernel allows local attacker to cause privilege escalation to root.
This issue affects: linux kernel versions prior to 5.18; version 4.14 and later versions. (
( CVE-2022-29581)



Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

Successful exploitation of this vulnerability could lead to a securitybreach or could affect integrity, availability, and confidentiality.

  • CVSS V3 rated as High - 7.8 severity.
  • CVSS V2 rated as High - 7.2 severity.
  • Solution
    Please refer to Amazon advisory: ALAS2KERNEL-5.10-2022-014 for affected packages and patching details, or update with your package manager.
    Vendor References
    Software Advisories
    Advisory ID Software Component Link
    ALAS2KERNEL-5.10-2022-014 Amazon Linux 2 URL Logo alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2022-014.html