SB2017100311 - Amazon Linux AMI update for kernel



SB2017100311 - Amazon Linux AMI update for kernel

Published: October 3, 2017

Security Bulletin ID SB2017100311
Severity
Low
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Local access
Highest impact Denial of service

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) Buffer overflow (CVE-ID: CVE-2017-14497)

The vulnerability allows a local attacker to cause DoS condition on the target system.

The weakness exists due to buffer overflow in the tpacket_rcv() function in 'net/packet/af_packet.c'. A local attacker can perform specially crafted system calls to write up to 10 bytes to kernel memory outside of the allocated kernel buffer, corrupt memory or XFS disk contents and cause the system to crash.

Successful exploitation of the vulnerability result in denial of service.

2) Out-of-bounds read (CVE-ID: CVE-2017-7558)

The vulnerability allows a local attacker to obtain potentially sensitive information.

The weakness exists due to put-of-bounds read in the inet_diag_msg_sctpaddrs_fill(), inet_diag_msg_sctpladdrs_fill(), and sctp_get_sctp_info() functions in 'net/sctp/sctp_diag.c'. A local attacker can gain access to important data in portions of slab memory on the target system.

Remediation

Install update from vendor's website.