QID 354030

Date Published: 2022-08-08

QID 354030: Amazon Linux Security Advisory for kernel : ALAS-2022-1624

there are use-after-free vulnerabilities caused by timer handler in net/rose/rose_timer.c of linux that allow attackers to crash linux kernel without any privileges. (
( CVE-2022-2318) linux disk/nic frontends data leaks t[his cna information record relates to multiple( CVEs; the text explains which aspects/vulnerabilities correspond to which( CVE.]
Linux block and network pv device frontends dont zero memory regions before sharing them with the backend (cve-2022-26365,( CVE-2022-33740).
Additionally the granularity of the grant table doesnt allow sharing less than a 4k page, leading to unrelated data residing in the same 4k page as data shared with a backend being accessible by such backend (cve-2022-33741,( CVE-2022-33742). (
( CVE-2022-26365) linux disk/nic frontends data leaks t[his cna information record relates to multiple( CVEs; the text explains which aspects/vulnerabilities correspond to which( CVE.]
( CVE-2022-33740) linux disk/nic frontends data leaks t[his cna information record relates to multiple( CVEs; the text explains which aspects/vulnerabilities correspond to which( CVE.]
( CVE-2022-33741) linux disk/nic frontends data leaks t[his cna information record relates to multiple( CVEs; the text explains which aspects/vulnerabilities correspond to which( CVE.]
( CVE-2022-33742) arm guests can cause dom0 dos via pv devices when mapping pages of guests on arm, dom0 is using an rbtree to keep track of the foreign mappings.
Updating of that rbtree is not always done completely with the related lock held, resulting in a small race window, which can be used by unprivileged guests via pv devices to cause inconsistencies of the rbtree.
( CVE-2022-33744)



Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

Successful exploitation of this vulnerability could lead to a securitybreach or could affect integrity, availability, and confidentiality.

  • CVSS V3 rated as High - 7.1 severity.
  • CVSS V2 rated as Medium - 3.6 severity.
  • Solution
    Please refer to Amazon advisory: ALAS-2022-1624 for affected packages and patching details, or update with your package manager.
    Vendor References
    Software Advisories
    Advisory ID Software Component Link
    ALAS-2022-1624 Amazon Linux URL Logo alas.aws.amazon.com/ALAS-2022-1624.html