QID 354055

Date Published: 2022-09-15

QID 354055: Amazon Linux Security Advisory for kernel : ALAS2KERNEL-5.15-2022-007

An out-of-bounds read flaw was found in the linux kernel's teletype subsystem.
The issue occurs in how a user triggers a race condition using ioctls tiocsptlck and tiocgptpeer and tiocsti and tcxonc with leakage of memory in the flush_to_ldisc function.
This flaw allows a local user to crash the system or read unauthorized random data from memory. (
( CVE-2022-1462) a bug in the ima subsystem was discovered which would incorrectly allow kexec to be used when kernel lockdown was enabled (cve-2022-21505) an issue was discovered in the linux kernel through 5.18.14.
Xfrm_expand_policies in net/xfrm/xfrm_policy.c can cause a refcount to be dropped twice. (
( CVE-2022-36879) a memory corruption flaw was found in the linux kernel's netfilter subsystem in the way a local user uses the libnetfilter_queue when analyzing a corrupted network packet.
This flaw allows a local user to crash the system or a remote user to crash the system when the libnetfilter_queue is used by a local user. (
( CVE-2022-36946)



Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

Successful exploitation of this vulnerability could lead to a securitybreach or could affect integrity, availability, and confidentiality.

  • CVSS V3 rated as High - 7.5 severity.
  • CVSS V2 rated as Medium - 3.3 severity.
  • Solution
    Please refer to Amazon advisory: ALAS2KERNEL-5.15-2022-007 for affected packages and patching details, or update with your package manager.
    Vendor References

    CVEs related to QID 354055

    Software Advisories
    Advisory ID Software Component Link
    ALAS2KERNEL-5.15-2022-007 Amazon Linux 2 URL Logo alas.aws.amazon.com/AL2/ALASKERNEL-5.15-2022-007.html