Amazon Linux AMI update for kernel



Risk High
Patch available YES
Number of vulnerabilities 2
CVE-ID CVE-2014-5206
CVE-2014-5207
CWE-ID CWE-264
Exploitation vector Network
Public exploit Public exploit code for vulnerability #2 is available.
Vulnerable software
Amazon Linux AMI
Operating systems & Components / Operating system

Vendor Amazon Web Services

Security Bulletin

This security bulletin contains information about 2 vulnerabilities.

1) Permissions, Privileges, and Access Controls

EUVDB-ID: #VU41394

Risk: High

CVSSv4.0: 6.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]

CVE-ID: CVE-2014-5206

CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls

Exploit availability: No

Description

The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.

The do_remount function in fs/namespace.c in the Linux kernel through 3.16.1 does not maintain the MNT_LOCK_READONLY bit across a remount of a bind mount, which allows local users to bypass an intended read-only restriction and defeat certain sandbox protection mechanisms via a "mount -o remount" command within a user namespace.

Mitigation

Update the affected packages:

i686:
    kernel-tools-debuginfo-3.14.19-17.43.amzn1.i686
    kernel-3.14.19-17.43.amzn1.i686
    kernel-debuginfo-3.14.19-17.43.amzn1.i686
    perf-3.14.19-17.43.amzn1.i686
    kernel-tools-3.14.19-17.43.amzn1.i686
    kernel-devel-3.14.19-17.43.amzn1.i686
    kernel-tools-devel-3.14.19-17.43.amzn1.i686
    perf-debuginfo-3.14.19-17.43.amzn1.i686
    kernel-headers-3.14.19-17.43.amzn1.i686
    kernel-debuginfo-common-i686-3.14.19-17.43.amzn1.i686

noarch:
    kernel-doc-3.14.19-17.43.amzn1.noarch

src:
    kernel-3.14.19-17.43.amzn1.src

x86_64:
    perf-debuginfo-3.14.19-17.43.amzn1.x86_64
    kernel-devel-3.14.19-17.43.amzn1.x86_64
    perf-3.14.19-17.43.amzn1.x86_64
    kernel-3.14.19-17.43.amzn1.x86_64
    kernel-debuginfo-3.14.19-17.43.amzn1.x86_64
    kernel-tools-devel-3.14.19-17.43.amzn1.x86_64
    kernel-debuginfo-common-x86_64-3.14.19-17.43.amzn1.x86_64
    kernel-tools-3.14.19-17.43.amzn1.x86_64
    kernel-tools-debuginfo-3.14.19-17.43.amzn1.x86_64
    kernel-headers-3.14.19-17.43.amzn1.x86_64

Vulnerable software versions

Amazon Linux AMI: All versions

CPE2.3 External links

https://alas.aws.amazon.com/ALAS-2014-417.html


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Permissions, Privileges, and Access Controls

EUVDB-ID: #VU41395

Risk: Low

CVSSv4.0: 6.2 [CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Clear]

CVE-ID: CVE-2014-5207

CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls

Exploit availability: Yes

Description

The vulnerability allows a local #AU# to execute arbitrary code.

fs/namespace.c in the Linux kernel through 3.16.1 does not properly restrict clearing MNT_NODEV, MNT_NOSUID, and MNT_NOEXEC and changing MNT_ATIME_MASK during a remount of a bind mount, which allows local users to gain privileges, interfere with backups and auditing on systems that had atime enabled, or cause a denial of service (excessive filesystem updating) on systems that had atime disabled via a "mount -o remount" command within a user namespace.

Mitigation

Update the affected packages:

i686:
    kernel-tools-debuginfo-3.14.19-17.43.amzn1.i686
    kernel-3.14.19-17.43.amzn1.i686
    kernel-debuginfo-3.14.19-17.43.amzn1.i686
    perf-3.14.19-17.43.amzn1.i686
    kernel-tools-3.14.19-17.43.amzn1.i686
    kernel-devel-3.14.19-17.43.amzn1.i686
    kernel-tools-devel-3.14.19-17.43.amzn1.i686
    perf-debuginfo-3.14.19-17.43.amzn1.i686
    kernel-headers-3.14.19-17.43.amzn1.i686
    kernel-debuginfo-common-i686-3.14.19-17.43.amzn1.i686

noarch:
    kernel-doc-3.14.19-17.43.amzn1.noarch

src:
    kernel-3.14.19-17.43.amzn1.src

x86_64:
    perf-debuginfo-3.14.19-17.43.amzn1.x86_64
    kernel-devel-3.14.19-17.43.amzn1.x86_64
    perf-3.14.19-17.43.amzn1.x86_64
    kernel-3.14.19-17.43.amzn1.x86_64
    kernel-debuginfo-3.14.19-17.43.amzn1.x86_64
    kernel-tools-devel-3.14.19-17.43.amzn1.x86_64
    kernel-debuginfo-common-x86_64-3.14.19-17.43.amzn1.x86_64
    kernel-tools-3.14.19-17.43.amzn1.x86_64
    kernel-tools-debuginfo-3.14.19-17.43.amzn1.x86_64
    kernel-headers-3.14.19-17.43.amzn1.x86_64

Vulnerable software versions

Amazon Linux AMI: All versions

CPE2.3 External links

https://alas.aws.amazon.com/ALAS-2014-417.html


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.



###SIDEBAR###