Lucene search

K
amazonAmazonALAS2-2020-1480
HistoryAug 18, 2020 - 8:29 p.m.

Important: kernel

2020-08-1820:29:00
alas.aws.amazon.com
30

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

6.8 Medium

AI Score

Confidence

High

7.8 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

0.014 Low

EPSS

Percentile

86.1%

Issue Overview:

A memory leak in the adis_update_scan_mode_burst() function in drivers/iio/imu/adis_buffer.c in the Linux kernel before 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-9c0530e898f3. (CVE-2019-19061)

A memory leak in the ath9k_wmi_cmd() function in drivers/net/wireless/ath/ath9k/wmi.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption), aka CID-728c1e2a05e4. (CVE-2019-19074)

In the Android kernel in F2FS driver there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with system execution privileges needed. User interaction is not needed for exploitation. (CVE-2019-9445)

A memory leak in the cx23888_ir_probe() function in drivers/media/pci/cx23885/cx23888-ir.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering kfifo_alloc() failures, aka CID-a7b2df76b42b. (CVE-2019-19054)

In a Linux KVM guest that has PV TLB enabled, a process in the guest kernel may be able to read memory locations from another process in the same guest. This problem is limit to the host running linux kernel 4.10 with a guest running linux kernel 4.16 or later. The problem mainly affects AMD processors but Intel CPUs cannot be ruled out. (CVE-2019-3016)

The unimac_mdio_probe function in drivers/net/phy/mdio-bcm-unimac.c in the Linux kernel through 4.15.8 does not validate certain resource availability, which allows local users to cause a denial of service (NULL pointer dereference). (CVE-2018-8043)

In the Linux kernel through 5.7.6, usbtest_disconnect in drivers/usb/misc/usbtest.c has a memory leak, aka CID-28ebeb8db770. ( CVE-2020-15393 )

A memory leak in the ccp_run_sha_cmd() function in drivers/crypto/ccp/ccp-ops.c in the Linux kernel through 5.3.9 allows attackers to cause a denial of service (memory consumption), aka CID-128c66429247. (CVE-2019-18808)

The xfs_bmap_extents_to_btree function in fs/xfs/libxfs/xfs_bmap.c in the Linux kernel through 4.16.3 allows local users to cause a denial of service (xfs_bmapi_write NULL pointer dereference) via a crafted xfs image. (CVE-2018-10323)

An issue was discovered in xfs_agf_verify in fs/xfs/libxfs/xfs_alloc.c in the Linux kernel through 5.6.10. Attackers may trigger a sync of excessive duration via an XFS v5 image with crafted metadata, aka CID-d0c7feaf8767. (CVE-2020-12655)

Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption) by triggering wait_for_completion_timeout() failures. This affects the htc_config_pipe_credits() function, the htc_setup_complete() function, and the htc_connect_service() function, aka CID-853acf7caf10. (CVE-2019-19073)

The Serial Attached SCSI (SAS) implementation in the Linux kernel mishandles a mutex within libsas. This allows local users to cause a denial of service (deadlock) by triggering certain error-handling code. (CVE-2017-18232)

The Serial Attached SCSI (SAS) implementation in the Linux kernel through 4.15.9 mishandles a mutex within libsas, which allows local users to cause a denial of service (deadlock) by triggering certain error-handling code. (CVE-2017-18232)

A flaw was found in the ZRAM kernel module, where a user with a local account and the ability to read the /sys/class/zram-control/hot_add file can create ZRAM device nodes in the /dev/ directory. This read allocates kernel memory and is not accounted for a user that triggers the creation of that ZRAM device. With this vulnerability, continually reading the device may consume a large amount of system memory and cause the Out-of-Memory (OOM) killer to activate and terminate random userspace processes, possibly making the system inoperable. (CVE-2020-10781)

Affected Packages:

kernel

Note:

This advisory is applicable to Amazon Linux 2 (AL2) Core repository. Visit this FAQ section for the difference between AL2 Core and AL2 Extras advisories.

Issue Correction:
Run yum update kernel to update your system.

New Packages:

aarch64:  
    kernel-4.14.192-147.314.amzn2.aarch64  
    kernel-headers-4.14.192-147.314.amzn2.aarch64  
    kernel-debuginfo-common-aarch64-4.14.192-147.314.amzn2.aarch64  
    perf-4.14.192-147.314.amzn2.aarch64  
    perf-debuginfo-4.14.192-147.314.amzn2.aarch64  
    python-perf-4.14.192-147.314.amzn2.aarch64  
    python-perf-debuginfo-4.14.192-147.314.amzn2.aarch64  
    kernel-tools-4.14.192-147.314.amzn2.aarch64  
    kernel-tools-devel-4.14.192-147.314.amzn2.aarch64  
    kernel-tools-debuginfo-4.14.192-147.314.amzn2.aarch64  
    kernel-devel-4.14.192-147.314.amzn2.aarch64  
    kernel-debuginfo-4.14.192-147.314.amzn2.aarch64  
  
i686:  
    kernel-headers-4.14.192-147.314.amzn2.i686  
  
src:  
    kernel-4.14.192-147.314.amzn2.src  
  
x86_64:  
    kernel-4.14.192-147.314.amzn2.x86_64  
    kernel-headers-4.14.192-147.314.amzn2.x86_64  
    kernel-debuginfo-common-x86_64-4.14.192-147.314.amzn2.x86_64  
    perf-4.14.192-147.314.amzn2.x86_64  
    perf-debuginfo-4.14.192-147.314.amzn2.x86_64  
    python-perf-4.14.192-147.314.amzn2.x86_64  
    python-perf-debuginfo-4.14.192-147.314.amzn2.x86_64  
    kernel-tools-4.14.192-147.314.amzn2.x86_64  
    kernel-tools-devel-4.14.192-147.314.amzn2.x86_64  
    kernel-tools-debuginfo-4.14.192-147.314.amzn2.x86_64  
    kernel-devel-4.14.192-147.314.amzn2.x86_64  
    kernel-debuginfo-4.14.192-147.314.amzn2.x86_64  
    kernel-livepatch-4.14.192-147.314-1.0-0.amzn2.x86_64  

Additional References

Red Hat: CVE-2017-18232, CVE-2018-10323, CVE-2018-8043, CVE-2019-18808, CVE-2019-19054, CVE-2019-19061, CVE-2019-19073, CVE-2019-19074, CVE-2019-3016, CVE-2019-9445, CVE-2020-10781, CVE-2020-12655, CVE-2020-15393

Mitre: CVE-2017-18232, CVE-2018-10323, CVE-2018-8043, CVE-2019-18808, CVE-2019-19054, CVE-2019-19061, CVE-2019-19073, CVE-2019-19074, CVE-2019-3016, CVE-2019-9445, CVE-2020-10781, CVE-2020-12655, CVE-2020-15393

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

6.8 Medium

AI Score

Confidence

High

7.8 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

0.014 Low

EPSS

Percentile

86.1%