QID 354016

Date Published: 2022-07-25

QID 354016: Amazon Linux Security Advisory for kernel : ALAS2KERNEL-5.10-2022-018

there are use-after-free vulnerabilities caused by timer handler in net/rose/rose_timer.c of linux that allow attackers to crash linux kernel without any privileges. (
( CVE-2022-2318) linux disk/nic frontends data leaks t[his cna information record relates to multiple( CVEs; the text explains which aspects/vulnerabilities correspond to which( CVE.]
Linux block and network pv device frontends dont zero memory regions before sharing them with the backend (cve-2022-26365,( CVE-2022-33740).
Additionally the granularity of the grant table doesnt allow sharing less than a 4k page, leading to unrelated data residing in the same 4k page as data shared with a backend being accessible by such backend (cve-2022-33741,( CVE-2022-33742). (
( CVE-2022-26365) linux disk/nic frontends data leaks t[his cna information record relates to multiple( CVEs; the text explains which aspects/vulnerabilities correspond to which( CVE.]
( CVE-2022-33740) linux disk/nic frontends data leaks t[his cna information record relates to multiple( CVEs; the text explains which aspects/vulnerabilities correspond to which( CVE.]
( CVE-2022-33741) linux disk/nic frontends data leaks t[his cna information record relates to multiple( CVEs; the text explains which aspects/vulnerabilities correspond to which( CVE.]
( CVE-2022-33742) network backend may cause linux netfront to use freed skbs while adding logic to support xdp (express data path), a code label was moved in a way allowing for skbs having references (pointers) retained for further processing to nevertheless be freed. (
( CVE-2022-33743) arm guests can cause dom0 dos via pv devices when mapping pages of guests on arm, dom0 is using an rbtree to keep track of the foreign mappings.

Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

Successful exploitation of this vulnerability could lead to a securitybreach or could affect integrity, availability, and confidentiality.

  • CVSS V3 rated as High - 7.8 severity.
  • CVSS V2 rated as High - 7.2 severity.
  • Solution
    Please refer to Amazon advisory: ALAS2KERNEL-5.10-2022-018 for affected packages and patching details, or update with your package manager.
    Vendor References
    Software Advisories
    Advisory ID Software Component Link
    ALAS2KERNEL-5.10-2022-018 Amazon Linux 2 URL Logo alas.aws.amazon.com/AL2/ALASKERNEL-5.10-2022-018.html