Lucene search

K
amazonAmazonALAS-2012-142
HistoryNov 20, 2012 - 6:34 a.m.

Medium: kernel

2012-11-2006:34:00
alas.aws.amazon.com
12

7.6 High

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:H/Au:N/C:C/I:C/A:C

0.028 Low

EPSS

Percentile

90.5%

Issue Overview:

A use-after-free flaw was found in the Linux kernel’s memory management subsystem in the way quota handling for huge pages was performed. A local, unprivileged user could use this flaw to cause a denial of service or, potentially, escalate their privileges. (CVE-2012-2133, Moderate)

A use-after-free flaw was found in the madvise() system call implementation in the Linux kernel. A local, unprivileged user could use this flaw to cause a denial of service or, potentially, escalate their privileges. (CVE-2012-3511, Moderate)

It was found that when running a 32-bit binary that uses a large number of shared libraries, one of the libraries would always be loaded at a predictable address in memory. An attacker could use this flaw to bypass the Address Space Layout Randomization (ASLR) security feature. (CVE-2012-1568, Low)

Buffer overflow flaws were found in the udf_load_logicalvol() function in the Universal Disk Format (UDF) file system implementation in the Linux kernel. An attacker with physical access to a system could use these flaws to cause a denial of service or escalate their privileges. (CVE-2012-3400, Low)

Affected Packages:

kernel

Issue Correction:
Run yum update kernel to update your system. You will need to reboot your system in order for the new kernel to be running.

New Packages:

i686:  
    kernel-devel-3.2.34-55.46.amzn1.i686  
    kernel-debuginfo-3.2.34-55.46.amzn1.i686  
    kernel-3.2.34-55.46.amzn1.i686  
    kernel-tools-3.2.34-55.46.amzn1.i686  
    kernel-headers-3.2.34-55.46.amzn1.i686  
    kernel-debuginfo-common-i686-3.2.34-55.46.amzn1.i686  
    kernel-tools-debuginfo-3.2.34-55.46.amzn1.i686  
  
noarch:  
    kernel-doc-3.2.34-55.46.amzn1.noarch  
  
src:  
    kernel-3.2.34-55.46.amzn1.src  
  
x86_64:  
    kernel-devel-3.2.34-55.46.amzn1.x86_64  
    kernel-tools-3.2.34-55.46.amzn1.x86_64  
    kernel-debuginfo-3.2.34-55.46.amzn1.x86_64  
    kernel-headers-3.2.34-55.46.amzn1.x86_64  
    kernel-debuginfo-common-x86_64-3.2.34-55.46.amzn1.x86_64  
    kernel-3.2.34-55.46.amzn1.x86_64  
    kernel-tools-debuginfo-3.2.34-55.46.amzn1.x86_64  

Additional References

Red Hat: CVE-2012-0957, CVE-2012-1568, CVE-2012-2133, CVE-2012-3400, CVE-2012-3511, CVE-2012-4508, CVE-2012-4565

Mitre: CVE-2012-0957, CVE-2012-1568, CVE-2012-2133, CVE-2012-3400, CVE-2012-3511, CVE-2012-4508, CVE-2012-4565

7.6 High

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:H/Au:N/C:C/I:C/A:C

0.028 Low

EPSS

Percentile

90.5%