QID 354008
Date Published: 2022-07-25
QID 354008: Amazon Linux Security Advisory for kernel : ALAS2KERNEL-5.4-2022-030
Due to the small table perturb size, a memory leak flaw was found in the linux kernel's tcp source port generation algorithm in the net/ipv4/tcp.c function.
This flaw allows an attacker to leak information and may cause a denial of service. (
( CVE-2022-1012) a use-after-free flaw was found in fs/ext4/namei.c:dx_insert_block() in the linux kernel's filesystem sub-component.
This flaw allows a local attacker with a user privilege to cause a denial of service. (
( CVE-2022-1184) a use-after-free vulnerability was found in the linux kernel's netfilter subsystem in net/netfilter/nf_tables_api.c.
This flaw allows a local attacker with user access to cause a privilege escalation issue. (
( CVE-2022-1966) kgdb and kdb allow read and write access to kernel memory, and thus should be restricted during lockdown.
An attacker with access to a serial port could trigger the debugger so it is important that the debugger respect the lockdown mode when/if it is triggered.
Cvss 3.1 base score 6.5 (confidentiality, integrity and availability impacts).
Cvss vector: (cvss:3.1/av:l/ac:l/pr:h/ui:r/s:u/c:h/i:h/a:h). (
( CVE-2022-21499) net/netfilter/nf_tables_api.c in the linux kernel through 5.18.1 allows a local user (able to create user/net namespaces) to escalate privileges to root because an incorrect nft_stateful_expr check leads to a use-after-free. (
( CVE-2022-32250) the linux kernel before 5.17.9 allows tcp servers to identify clients by observing what source ports are used. (
( CVE-2022-32296) an issue was discovered in the linux kernel through 5.18.3 on powerpc 32-bit platforms.
There is a buffer overflow in ptrace peekuser and pokeuser (aka peekusr and pokeusr) when accessing floating point registers. (
( CVE-2022-32981)
Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.
Successful exploitation of this vulnerability could lead to a securitybreach or could affect integrity, availability, and confidentiality.
- ALAS2KERNEL-5.4-2022-030 -
alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2022-030.html
CVEs related to QID 354008
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| ALAS2KERNEL-5.4-2022-030 | Amazon Linux 2 |
|