Lucene search

K
amazonAmazonALAS-2013-148
HistoryJan 14, 2013 - 1:14 a.m.

Medium: kernel, nvidia

2013-01-1401:14:00
alas.aws.amazon.com
18

7.1 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:N/I:N/A:C

0.029 Low

EPSS

Percentile

90.9%

Issue Overview:

A malicious Network File System version 4 (NFSv4) server could return a crafted reply to a GETACL request, causing a denial of service on the client. (CVE-2012-2375, Moderate)

A divide-by-zero flaw was found in the TCP Illinois congestion control algorithm implementation in the Linux kernel. If the TCP Illinois congestion control algorithm were in use (the sysctl net.ipv4.tcp_congestion_control variable set to “illinois”), a local, unprivileged user could trigger this flaw and cause a denial of service. (CVE-2012-4565, Moderate)

A NULL pointer dereference flaw was found in the way a new node’s hot added memory was propagated to other nodes’ zonelists. By utilizing this newly added memory from one of the remaining nodes, a local, unprivileged user could use this flaw to cause a denial of service. (CVE-2012-5517, Moderate)

It was found that a prevoius kernel release did not correctly fix the CVE-2009-4307 issue, a divide-by-zero flaw in the ext4 file system code. A local, unprivileged user with the ability to mount an ext4 file system could use this flaw to cause a denial of service. (CVE-2012-2100, Low)

A flaw was found in the way the Linux kernel’s IPv6 implementation handled overlapping, fragmented IPv6 packets. A remote attacker could potentially use this flaw to bypass protection mechanisms (such as a firewall or intrusion detection system (IDS)) when sending network packets to a target system. (CVE-2012-4444, Low)

Affected Packages:

kernel, nvidia

Issue Correction:
Run yum update kernel nvidia to update your system. You will need to reboot your system in order for the new kernel to be running.

New Packages:

i686:  
    kernel-devel-3.2.36-1.46.amzn1.i686  
    kernel-headers-3.2.36-1.46.amzn1.i686  
    kernel-tools-debuginfo-3.2.36-1.46.amzn1.i686  
    kernel-tools-3.2.36-1.46.amzn1.i686  
    kernel-debuginfo-3.2.36-1.46.amzn1.i686  
    kernel-3.2.36-1.46.amzn1.i686  
    kernel-debuginfo-common-i686-3.2.36-1.46.amzn1.i686  
  
noarch:  
    kernel-doc-3.2.36-1.46.amzn1.noarch  
  
src:  
    kernel-3.2.36-1.46.amzn1.src  
    nvidia-310.19-2012.09.10.amzn1.src  
  
x86_64:  
    kernel-devel-3.2.36-1.46.amzn1.x86_64  
    kernel-debuginfo-common-x86_64-3.2.36-1.46.amzn1.x86_64  
    kernel-tools-3.2.36-1.46.amzn1.x86_64  
    kernel-debuginfo-3.2.36-1.46.amzn1.x86_64  
    kernel-3.2.36-1.46.amzn1.x86_64  
    kernel-tools-debuginfo-3.2.36-1.46.amzn1.x86_64  
    kernel-headers-3.2.36-1.46.amzn1.x86_64  
    nvidia-310.19-2012.09.10.amzn1.x86_64  
    nvidia-kmod-3.2.36-1.46.amzn1-310.19-2012.09.10.amzn1.x86_64  

Additional References

Red Hat: CVE-2012-2100, CVE-2012-2375, CVE-2012-4444, CVE-2012-4565, CVE-2012-5517

Mitre: CVE-2012-2100, CVE-2012-2375, CVE-2012-4444, CVE-2012-4565, CVE-2012-5517

7.1 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:N/I:N/A:C

0.029 Low

EPSS

Percentile

90.9%