QID 354020

Date Published: 2022-07-25

QID 354020: Amazon Linux Security Advisory for kernel : ALAS2KERNEL-5.15-2022-005

linux disk/nic frontends data leaks t[his cna information record relates to multiple( CVEs; the text explains which aspects/vulnerabilities correspond to which( CVE.]
Linux block and network pv device frontends dont zero memory regions before sharing them with the backend (cve-2022-26365,( CVE-2022-33740).
Additionally the granularity of the grant table doesnt allow sharing less than a 4k page, leading to unrelated data residing in the same 4k page as data shared with a backend being accessible by such backend (cve-2022-33741,( CVE-2022-33742). (
( CVE-2022-26365) linux disk/nic frontends data leaks t[his cna information record relates to multiple( CVEs; the text explains which aspects/vulnerabilities correspond to which( CVE.]
( CVE-2022-33740) linux disk/nic frontends data leaks t[his cna information record relates to multiple( CVEs; the text explains which aspects/vulnerabilities correspond to which( CVE.]
( CVE-2022-33741) linux disk/nic frontends data leaks t[his cna information record relates to multiple( CVEs; the text explains which aspects/vulnerabilities correspond to which( CVE.]
( CVE-2022-33742) network backend may cause linux netfront to use freed skbs while adding logic to support xdp (express data path), a code label was moved in a way allowing for skbs having references (pointers) retained for further processing to nevertheless be freed. (
( CVE-2022-33743) a heap buffer overflow flaw was found in the linux kernels netfilter subsystem in the way a user provides incorrect input of the nft_data_verdict type.
This flaw allows a local user to crash or potentially escalate their privileges on the system. (
( CVE-2022-34918)



Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

Successful exploitation of this vulnerability could lead to a securitybreach or could affect integrity, availability, and confidentiality.

  • CVSS V3 rated as High - 7.8 severity.
  • CVSS V2 rated as High - 7.2 severity.
  • Solution
    Please refer to Amazon advisory: ALAS2KERNEL-5.15-2022-005 for affected packages and patching details, or update with your package manager.
    Vendor References
    Software Advisories
    Advisory ID Software Component Link
    ALAS2KERNEL-5.15-2022-005 Amazon Linux 2 URL Logo alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2022-005.html