QID 354251

Date Published: 2022-12-12

QID 354251: Amazon Linux Security Advisory for kernel : ALAS-2022-1645

in v4l2_m2m_querybuf of v4l2-mem2mem.c, there is a possible out of bounds write due to improper input validation.
This could lead to local escalation of privilege with system execution privileges needed.
User interaction is not needed for exploitation.
Product: androidversions: android kernelandroid id: a-223375145references: upstream kernel (cve-2022-20369) a flaw was found in hw.
In certain processors with intels enhanced indirect branch restricted speculation (eibrs) capabilities, soon after vm exit or ibpb command event, the linear address following the most recent near call instruction prior to a vm exit may be used as the return stack buffer (rsb) prediction. (
( CVE-2022-26373) a flaw use after free in the linux kernel nilfs file system was found in the way user triggers function security_inode_alloc to fail with following call to function nilfs_mdt_destroy.
A local user could use this flaw to crash the system or potentially escalate their privileges on the system. (
( CVE-2022-2978) a vulnerability classified as problematic was found in linux kernel.
This vulnerability affects the function bnx2x_tpa_stop of the file drivers/net/ethernet/broadcom/bnx2x/bnx2x_cmn.c of the component bpf.
The manipulation leads to memory leak.
It is recommended to apply a patch to fix this issue.
Vdb-211042 is the identifier assigned to this vulnerability. (
( CVE-2022-3542) a vulnerability classified as critical was found in linux kernel.
Affected by this vulnerability is the function l2cap_reassemble_sdu of the file net/bluetooth/l2cap_core.c of the component bluetooth.
The manipulation leads to use after free.
The associated identifier of this vulnerability is vdb-211087. (

Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

Successful exploitation of this vulnerability could lead to a securitybreach or could affect integrity, availability, and confidentiality.

  • CVSS V3 rated as Critical - 9.8 severity.
  • CVSS V2 rated as Medium - 5.4 severity.
  • Solution
    Please refer to Amazon advisory: ALAS-2022-1645 for affected packages and patching details, or update with your package manager.
    Vendor References
    Software Advisories
    Advisory ID Software Component Link
    ALAS-2022-1645 Amazon Linux URL Logo alas.aws.amazon.com/ALAS-2022-1645.html