Lucene search

K
amazonAmazonALAS-2014-368
HistoryJul 09, 2014 - 4:29 p.m.

Medium: kernel

2014-07-0916:29:00
alas.aws.amazon.com
165

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.011 Low

EPSS

Percentile

84.4%

Issue Overview:

arch/x86/kernel/entry_32.S in the Linux kernel through 3.15.1 on 32-bit x86 platforms, when syscall auditing is enabled and the sep CPU feature flag is set, allows local users to cause a denial of service (OOPS and system crash) via an invalid syscall number, as demonstrated by number 1000.

Array index error in the aio_read_events_ring function in fs/aio.c in the Linux kernel through 3.15.1 allows local users to obtain sensitive information from kernel memory via a large head value.

The capabilities implementation in the Linux kernel before 3.14.8 does not properly consider that namespaces are inapplicable to inodes, which allows local users to bypass intended chmod restrictions by first creating a user namespace, as demonstrated by setting the setgid bit on a file with group ownership of root.

DISPUTED Multiple integer overflows in the lzo1x_decompress_safe function in lib/lzo/lzo1x_decompress_safe.c in the LZO decompressor in the Linux kernel before 3.15.2 allow context-dependent attackers to cause a denial of service (memory corruption) via a crafted Literal Run. NOTE: the author of the LZO algorithms says “the Linux kernel is not affected; media hype.”

Affected Packages:

kernel

Issue Correction:
Run yum update kernel to update your system. You will need to reboot your system in order for the new kernel to be running.

New Packages:

i686:  
    kernel-devel-3.10.48-55.140.amzn1.i686  
    perf-debuginfo-3.10.48-55.140.amzn1.i686  
    kernel-3.10.48-55.140.amzn1.i686  
    kernel-headers-3.10.48-55.140.amzn1.i686  
    kernel-debuginfo-3.10.48-55.140.amzn1.i686  
    perf-3.10.48-55.140.amzn1.i686  
    kernel-debuginfo-common-i686-3.10.48-55.140.amzn1.i686  
  
noarch:  
    kernel-doc-3.10.48-55.140.amzn1.noarch  
  
src:  
    kernel-3.10.48-55.140.amzn1.src  
  
x86_64:  
    kernel-debuginfo-3.10.48-55.140.amzn1.x86_64  
    kernel-headers-3.10.48-55.140.amzn1.x86_64  
    kernel-3.10.48-55.140.amzn1.x86_64  
    kernel-devel-3.10.48-55.140.amzn1.x86_64  
    kernel-debuginfo-common-x86_64-3.10.48-55.140.amzn1.x86_64  
    perf-debuginfo-3.10.48-55.140.amzn1.x86_64  
    perf-3.10.48-55.140.amzn1.x86_64  

Additional References

Red Hat: CVE-2014-0206, CVE-2014-4014, CVE-2014-4508, CVE-2014-4608

Mitre: CVE-2014-0206, CVE-2014-4014, CVE-2014-4508, CVE-2014-4608

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.011 Low

EPSS

Percentile

84.4%