SB2012070505 - Amazon Linux AMI update for kernel
Published: July 5, 2012
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 3 secuirty vulnerabilities.
1) Resource management error (CVE-ID: CVE-2011-1083)
The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.
The epoll implementation in the Linux kernel 2.6.37.2 and earlier does not properly traverse a tree of epoll file descriptors, which allows local users to cause a denial of service (CPU consumption) via a crafted application that makes epoll_create and epoll_ctl system calls.
2) Input validation error (CVE-ID: CVE-2011-4131)
The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.
The NFSv4 implementation in the Linux kernel before 3.2.2 does not properly handle bitmap sizes in GETACL replies, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words.
3) Input validation error (CVE-ID: CVE-2012-2372)
The vulnerability allows a local #AU# to perform a denial of service (DoS) attack.
The rds_ib_xmit function in net/rds/ib_send.c in the Reliable Datagram Sockets (RDS) protocol implementation in the Linux kernel 3.7.4 and earlier allows local users to cause a denial of service (BUG_ON and kernel panic) by establishing an RDS connection with the source IP address equal to the IPoIB interface's own IP address, as demonstrated by rds-ping.
Remediation
Install update from vendor's website.