SB2014022608 - Amazon Linux AMI update for kernel



SB2014022608 - Amazon Linux AMI update for kernel

Published: February 26, 2014

Security Bulletin ID SB2014022608
Severity
Medium
Patch available
YES
Number of vulnerabilities 4
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 4 secuirty vulnerabilities.


1) Input validation error (CVE-ID: CVE-2013-7263)

The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.

The Linux kernel before 3.12.4 updates certain length values before ensuring that associated data structures have been initialized, which allows local users to obtain sensitive information from kernel stack memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call, related to net/ipv4/ping.c, net/ipv4/raw.c, net/ipv4/udp.c, net/ipv6/raw.c, and net/ipv6/udp.c.


2) Input validation error (CVE-ID: CVE-2013-7265)

The vulnerability allows a remote non-authenticated attacker to gain access to sensitive information.

The pn_recvmsg function in net/phonet/datagram.c in the Linux kernel before 3.12.4 updates a certain length value before ensuring that an associated data structure has been initialized, which allows local users to obtain sensitive information from kernel stack memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call.


3) Buffer overflow (CVE-ID: CVE-2014-0069)

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

The cifs_iovec_write function in fs/cifs/file.c in the Linux kernel through 3.13.5 does not properly handle uncached write operations that copy fewer than the requested number of bytes, which allows local users to obtain sensitive information from kernel memory, cause a denial of service (memory corruption and system crash), or possibly gain privileges via a writev system call with a crafted pointer.


4) Input validation error (CVE-ID: CVE-2014-1874)

The vulnerability allows a remote non-authenticated attacker to perform a denial of service (DoS) attack.

The security_context_to_sid_core function in security/selinux/ss/services.c in the Linux kernel before 3.13.4 allows local users to cause a denial of service (system crash) by leveraging the CAP_MAC_ADMIN capability to set a zero-length security context.


Remediation

Install update from vendor's website.