SB2017100311 - Amazon Linux AMI update for kernel
Published: October 3, 2017
Security Bulletin ID
SB2017100311
Severity
Low
Patch available
YES
Number of vulnerabilities
2
Exploitation vector
Local access
Highest impact
Denial of service
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 2 secuirty vulnerabilities.
1) Buffer overflow (CVE-ID: CVE-2017-14497)
The vulnerability allows a local attacker to cause DoS condition on the target system.The weakness exists due to buffer overflow in the tpacket_rcv() function in 'net/packet/af_packet.c'. A local attacker can perform specially crafted system calls to write up to 10 bytes to kernel memory outside of the allocated kernel buffer, corrupt memory or XFS disk contents and cause the system to crash.
Successful exploitation of the vulnerability result in denial of service.
2) Out-of-bounds read (CVE-ID: CVE-2017-7558)
The vulnerability allows a local attacker to obtain potentially sensitive information.The weakness exists due to put-of-bounds read in the inet_diag_msg_sctpaddrs_fill(), inet_diag_msg_sctpladdrs_fill(), and sctp_get_sctp_info() functions in 'net/sctp/sctp_diag.c'. A local attacker can gain access to important data in portions of slab memory on the target system.
Remediation
Install update from vendor's website.