SB2012070505 - Amazon Linux AMI update for kernel



SB2012070505 - Amazon Linux AMI update for kernel

Published: July 5, 2012

Security Bulletin ID SB2012070505
Severity
Medium
Patch available
YES
Number of vulnerabilities 3
Exploitation vector Remote access
Highest impact Denial of service

Breakdown by Severity

Medium 67% Low 33%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 3 secuirty vulnerabilities.


1) Resource management error (CVE-ID: CVE-2011-1083)

The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.

The epoll implementation in the Linux kernel 2.6.37.2 and earlier does not properly traverse a tree of epoll file descriptors, which allows local users to cause a denial of service (CPU consumption) via a crafted application that makes epoll_create and epoll_ctl system calls.


2) Input validation error (CVE-ID: CVE-2011-4131)

The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.

The NFSv4 implementation in the Linux kernel before 3.2.2 does not properly handle bitmap sizes in GETACL replies, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words.


3) Input validation error (CVE-ID: CVE-2012-2372)

The vulnerability allows a local #AU# to perform a denial of service (DoS) attack.

The rds_ib_xmit function in net/rds/ib_send.c in the Reliable Datagram Sockets (RDS) protocol implementation in the Linux kernel 3.7.4 and earlier allows local users to cause a denial of service (BUG_ON and kernel panic) by establishing an RDS connection with the source IP address equal to the IPoIB interface's own IP address, as demonstrated by rds-ping.


Remediation

Install update from vendor's website.