ALAS2KERNEL-5.15-2022-005


Amazon Linux 2 Security Advisory: ALAS2KERNEL-5.15-2022-005
Advisory Released Date: 2022-07-21
Advisory Updated Date: 2025-05-21
Severity: Important

Issue Overview:

Linux disk/nic frontends data leaks T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Linux Block and Network PV device frontends don't zero memory regions before sharing them with the backend (CVE-2022-26365, CVE-2022-33740). Additionally the granularity of the grant table doesn't allow sharing less than a 4K page, leading to unrelated data residing in the same 4K page as data shared with a backend being accessible by such backend (CVE-2022-33741, CVE-2022-33742). (CVE-2022-26365)

Linux disk/nic frontends data leaks T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Linux Block and Network PV device frontends don't zero memory regions before sharing them with the backend (CVE-2022-26365, CVE-2022-33740). Additionally the granularity of the grant table doesn't allow sharing less than a 4K page, leading to unrelated data residing in the same 4K page as data shared with a backend being accessible by such backend (CVE-2022-33741, CVE-2022-33742). (CVE-2022-33740)

Linux disk/nic frontends data leaks T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Linux Block and Network PV device frontends don't zero memory regions before sharing them with the backend (CVE-2022-26365, CVE-2022-33740). Additionally the granularity of the grant table doesn't allow sharing less than a 4K page, leading to unrelated data residing in the same 4K page as data shared with a backend being accessible by such backend (CVE-2022-33741, CVE-2022-33742). (CVE-2022-33741)

Linux disk/nic frontends data leaks T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] Linux Block and Network PV device frontends don't zero memory regions before sharing them with the backend (CVE-2022-26365, CVE-2022-33740). Additionally the granularity of the grant table doesn't allow sharing less than a 4K page, leading to unrelated data residing in the same 4K page as data shared with a backend being accessible by such backend (CVE-2022-33741, CVE-2022-33742). (CVE-2022-33742)

network backend may cause Linux netfront to use freed SKBs While adding logic to support XDP (eXpress Data Path), a code label was moved in a way allowing for SKBs having references (pointers) retained for further processing to nevertheless be freed. (CVE-2022-33743)

A heap buffer overflow flaw was found in the Linux kernel's Netfilter subsystem in the way a user provides incorrect input of the NFT_DATA_VERDICT type. This flaw allows a local user to crash or potentially escalate their privileges on the system. (CVE-2022-34918)

In the Linux kernel, the following vulnerability has been resolved:

scsi: qla2xxx: Fix crash during module load unload test (CVE-2022-49160)

In the Linux kernel, the following vulnerability has been resolved:

block: fix rq-qos breakage from skipping rq_qos_done_bio() (CVE-2022-49266)

In the Linux kernel, the following vulnerability has been resolved:

module: fix [e_shstrndx].sh_size=0 OOB access (CVE-2022-49444)

In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix insufficient bounds propagation from adjust_scalar_min_max_vals (CVE-2022-49658)

In the Linux kernel, the following vulnerability has been resolved:

ipv6: fix lockdep splat in in6_dump_addrs() (CVE-2022-49662)

In the Linux kernel, the following vulnerability has been resolved:

tunnels: do not assume mac header is set in skb_tunnel_check_pmtu() (CVE-2022-49663)

In the Linux kernel, the following vulnerability has been resolved:

tipc: move bc link creation back to tipc_node_create (CVE-2022-49664)

In the Linux kernel, the following vulnerability has been resolved:

net: bonding: fix use-after-free after 802.3ad slave unbind (CVE-2022-49667)

In the Linux kernel, the following vulnerability has been resolved:

linux/dim: Fix divide by 0 in RDMA DIM (CVE-2022-49670)

In the Linux kernel, the following vulnerability has been resolved:

RDMA/cm: Fix memory leak in ib_cm_insert_listen (CVE-2022-49671)

In the Linux kernel, the following vulnerability has been resolved:

net: tun: unlink NAPI from device on destruction (CVE-2022-49672)

In the Linux kernel, the following vulnerability has been resolved:

dm raid: fix KASAN warning in raid5_add_disks (CVE-2022-49673)

In the Linux kernel, the following vulnerability has been resolved:

dm raid: fix accesses beyond end of raid member array (CVE-2022-49674)

In the Linux kernel, the following vulnerability has been resolved:

tick/nohz: unexport __init-annotated tick_nohz_full_setup() (CVE-2022-49675)

In the Linux kernel, the following vulnerability has been resolved:

virtio_net: fix xdp_rxq_info bug after suspend/resume (CVE-2022-49687)

In the Linux kernel, the following vulnerability has been resolved:

afs: Fix dynamic root getattr (CVE-2022-49688)

In the Linux kernel, the following vulnerability has been resolved:

erspan: do not assume transport header is always set (CVE-2022-49691)

In the Linux kernel, the following vulnerability has been resolved:

igb: fix a use-after-free issue in igb_clean_tx_ring (CVE-2022-49695)

In the Linux kernel, the following vulnerability has been resolved:

tipc: fix use-after-free Read in tipc_named_reinit (CVE-2022-49696)

In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix request_sock leak in sk lookup helpers (CVE-2022-49697)

In the Linux kernel, the following vulnerability has been resolved:

netfilter: use get_random_u32 instead of prandom (CVE-2022-49698)

In the Linux kernel, the following vulnerability has been resolved:

mm/slub: add missing TID updates on slab deactivation (CVE-2022-49700)

In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix hang during unmount when block group reclaim task is running (CVE-2022-49702)

In the Linux kernel, the following vulnerability has been resolved:

sock: redo the psock vs ULP protection check (CVE-2022-49732)


Affected Packages:

kernel


Note:

This advisory is applicable to Amazon Linux 2 - Kernel-5.15 Extra. Visit this page to learn more about Amazon Linux 2 (AL2) Extras and this FAQ section for the difference between AL2 Core and AL2 Extras advisories.


Issue Correction:
Run yum update kernel to update your system.

New Packages:
aarch64:
    kernel-5.15.54-25.126.amzn2.aarch64
    kernel-headers-5.15.54-25.126.amzn2.aarch64
    kernel-debuginfo-common-aarch64-5.15.54-25.126.amzn2.aarch64
    perf-5.15.54-25.126.amzn2.aarch64
    perf-debuginfo-5.15.54-25.126.amzn2.aarch64
    python-perf-5.15.54-25.126.amzn2.aarch64
    python-perf-debuginfo-5.15.54-25.126.amzn2.aarch64
    kernel-tools-5.15.54-25.126.amzn2.aarch64
    kernel-tools-devel-5.15.54-25.126.amzn2.aarch64
    kernel-tools-debuginfo-5.15.54-25.126.amzn2.aarch64
    bpftool-5.15.54-25.126.amzn2.aarch64
    bpftool-debuginfo-5.15.54-25.126.amzn2.aarch64
    kernel-devel-5.15.54-25.126.amzn2.aarch64
    kernel-debuginfo-5.15.54-25.126.amzn2.aarch64
    kernel-livepatch-5.15.54-25.126-1.0-0.amzn2.aarch64

i686:
    kernel-headers-5.15.54-25.126.amzn2.i686

src:
    kernel-5.15.54-25.126.amzn2.src

x86_64:
    kernel-5.15.54-25.126.amzn2.x86_64
    kernel-headers-5.15.54-25.126.amzn2.x86_64
    kernel-debuginfo-common-x86_64-5.15.54-25.126.amzn2.x86_64
    perf-5.15.54-25.126.amzn2.x86_64
    perf-debuginfo-5.15.54-25.126.amzn2.x86_64
    python-perf-5.15.54-25.126.amzn2.x86_64
    python-perf-debuginfo-5.15.54-25.126.amzn2.x86_64
    kernel-tools-5.15.54-25.126.amzn2.x86_64
    kernel-tools-devel-5.15.54-25.126.amzn2.x86_64
    kernel-tools-debuginfo-5.15.54-25.126.amzn2.x86_64
    bpftool-5.15.54-25.126.amzn2.x86_64
    bpftool-debuginfo-5.15.54-25.126.amzn2.x86_64
    kernel-devel-5.15.54-25.126.amzn2.x86_64
    kernel-debuginfo-5.15.54-25.126.amzn2.x86_64
    kernel-livepatch-5.15.54-25.126-1.0-0.amzn2.x86_64

Changelog:

2025-05-21: CVE-2022-49671 was added to this advisory.

2025-05-21: CVE-2022-49160 was added to this advisory.

2025-05-21: CVE-2022-49672 was added to this advisory.

2025-05-21: CVE-2022-49658 was added to this advisory.

2025-05-21: CVE-2022-49702 was added to this advisory.

2025-05-21: CVE-2022-49698 was added to this advisory.

2025-05-21: CVE-2022-49670 was added to this advisory.

2025-05-21: CVE-2022-49675 was added to this advisory.

2025-05-21: CVE-2022-49732 was added to this advisory.

2025-05-21: CVE-2022-49674 was added to this advisory.

2025-05-21: CVE-2022-49444 was added to this advisory.

2025-05-21: CVE-2022-49664 was added to this advisory.

2025-05-21: CVE-2022-49266 was added to this advisory.

2025-05-21: CVE-2022-49697 was added to this advisory.

2025-05-21: CVE-2022-49688 was added to this advisory.

2025-04-09: CVE-2022-49696 was added to this advisory.

2025-03-13: CVE-2022-49673 was added to this advisory.

2025-03-13: CVE-2022-49687 was added to this advisory.

2025-03-13: CVE-2022-49663 was added to this advisory.

2025-03-13: CVE-2022-49700 was added to this advisory.

2025-03-13: CVE-2022-49662 was added to this advisory.

2025-03-13: CVE-2022-49691 was added to this advisory.

2025-03-13: CVE-2022-49695 was added to this advisory.

2025-03-13: CVE-2022-49667 was added to this advisory.