Lucene search

K
amazonAmazonALAS2-2018-939
HistoryJan 11, 2018 - 9:05 p.m.

Critical: kernel

2018-01-1121:05:00
alas.aws.amazon.com
23

5.6 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N

6.8 Medium

AI Score

Confidence

High

4.7 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:M/Au:N/C:C/I:N/A:N

0.975 High

EPSS

Percentile

100.0%

Issue Overview:

An updated kernel release for Amazon Linux has been made available which prevents speculative execution of indirect branches within the kernel. This release incorporates latest stable open source Linux security improvements to address CVE-2017-5715 within the kernel and builds upon previously incorporated Kernel Page Table Isolation (KPTI) that addressed CVE-2017-5754. Customers must upgrade to the latest Amazon Linux kernel or AMI to effectively mitigate the impact of both CVE-2017-5754 and CVE-2017-5715 on MMU privilege separation (kernel mode vs. user mode) within their instance.

Customers with existing Amazon Linux AMI instances should run the following command to ensure they receive the updated package:

<i>sudo yum update kernel</i>

As is standard per any update of the Linux kernel, after the yum update is complete, a reboot is required for updates to take effect.

Please refer to https://aws.amazon.com/security/security-bulletins/AWS-2018-013/ for additional information regarding CVE-2017-5754.

Updated on 2018-01-06: Additional KPTI improvements.
Updated on 2018-01-09: Updated details
Updated on 2018-01-13: Additional fixes for CVE-2017-5715

Affected Packages:

kernel

Note:

This advisory is applicable to Amazon Linux 2 (AL2) Core repository. Visit this FAQ section for the difference between AL2 Core and AL2 Extras advisories.

Issue Correction:
Run yum update kernel to update your system. You will need to reboot your system in order for the new kernel to be running.

New Packages:

noarch:  
    kernel-doc-4.9.76-38.79.amzn2.noarch  
  
src:  
    kernel-4.9.76-38.79.amzn2.src  
  
x86_64:  
    kernel-4.9.76-38.79.amzn2.x86_64  
    kernel-headers-4.9.76-38.79.amzn2.x86_64  
    kernel-debuginfo-common-x86_64-4.9.76-38.79.amzn2.x86_64  
    perf-4.9.76-38.79.amzn2.x86_64  
    perf-debuginfo-4.9.76-38.79.amzn2.x86_64  
    python-perf-4.9.76-38.79.amzn2.x86_64  
    python-perf-debuginfo-4.9.76-38.79.amzn2.x86_64  
    kernel-tools-4.9.76-38.79.amzn2.x86_64  
    kernel-tools-devel-4.9.76-38.79.amzn2.x86_64  
    kernel-tools-debuginfo-4.9.76-38.79.amzn2.x86_64  
    kernel-devel-4.9.76-38.79.amzn2.x86_64  
    kernel-debuginfo-4.9.76-38.79.amzn2.x86_64  

Additional References

Red Hat: CVE-2017-5715, CVE-2017-5754

Mitre: CVE-2017-5715, CVE-2017-5754

5.6 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N

6.8 Medium

AI Score

Confidence

High

4.7 Medium

CVSS2

Access Vector

LOCAL

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:M/Au:N/C:C/I:N/A:N

0.975 High

EPSS

Percentile

100.0%