vulnerability
Amazon Linux AMI 2: CVE-2022-1786: Security patch for kernel-livepatch-5.10.106-102.504, kernel-livepatch-5.10.109-104.500, kernel-livepatch-5.10.112-108.499, kernel, kernel-livepatch-5.10.102-99.473 (Multiple Advisories)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
7 | (AV:L/AC:L/Au:N/C:C/I:C/A:C) | Jun 2, 2022 | Jul 4, 2022 | Nov 27, 2024 |
Severity
7
CVSS
(AV:L/AC:L/Au:N/C:C/I:C/A:C)
Published
Jun 2, 2022
Added
Jul 4, 2022
Modified
Nov 27, 2024
Description
A use-after-free flaw was found in the Linux kernel’s io_uring subsystem in the way a user sets up a ring with IORING_SETUP_IOPOLL with more than one task completing submissions on this ring. This flaw allows a local user to crash or escalate their privileges on the system.
Solution(s)
amazon-linux-ami-2-upgrade-bpftoolamazon-linux-ami-2-upgrade-bpftool-debuginfoamazon-linux-ami-2-upgrade-kernelamazon-linux-ami-2-upgrade-kernel-debuginfoamazon-linux-ami-2-upgrade-kernel-debuginfo-common-aarch64amazon-linux-ami-2-upgrade-kernel-debuginfo-common-x86_64amazon-linux-ami-2-upgrade-kernel-develamazon-linux-ami-2-upgrade-kernel-headersamazon-linux-ami-2-upgrade-kernel-livepatch-5-10-102-99-473amazon-linux-ami-2-upgrade-kernel-livepatch-5-10-102-99-473-debuginfoamazon-linux-ami-2-upgrade-kernel-livepatch-5-10-106-102-504amazon-linux-ami-2-upgrade-kernel-livepatch-5-10-106-102-504-debuginfoamazon-linux-ami-2-upgrade-kernel-livepatch-5-10-109-104-500amazon-linux-ami-2-upgrade-kernel-livepatch-5-10-109-104-500-debuginfoamazon-linux-ami-2-upgrade-kernel-livepatch-5-10-112-108-499amazon-linux-ami-2-upgrade-kernel-livepatch-5-10-112-108-499-debuginfoamazon-linux-ami-2-upgrade-kernel-livepatch-5-10-118-111-515amazon-linux-ami-2-upgrade-kernel-toolsamazon-linux-ami-2-upgrade-kernel-tools-debuginfoamazon-linux-ami-2-upgrade-kernel-tools-develamazon-linux-ami-2-upgrade-perfamazon-linux-ami-2-upgrade-perf-debuginfoamazon-linux-ami-2-upgrade-python-perfamazon-linux-ami-2-upgrade-python-perf-debuginfo

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.