Lucene search

K
amazonAmazonALAS-2014-289
HistoryFeb 26, 2014 - 2:26 p.m.

Medium: kernel

2014-02-2614:26:00
alas.aws.amazon.com
28

CVSS2

7.2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

EPSS

0

Percentile

10.1%

Issue Overview:

The pn_recvmsg function in net/phonet/datagram.c in the Linux kernel before 3.12.4 updates a certain length value before ensuring that an associated data structure has been initialized, which allows local users to obtain sensitive information from kernel stack memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call.

The security_context_to_sid_core function in security/selinux/ss/services.c in the Linux kernel before 3.13.4 allows local users to cause a denial of service (system crash) by leveraging the CAP_MAC_ADMIN capability to set a zero-length security context.

The Linux kernel before 3.12.4 updates certain length values before ensuring that associated data structures have been initialized, which allows local users to obtain sensitive information from kernel stack memory via a (1) recvfrom, (2) recvmmsg, or (3) recvmsg system call, related to net/ipv4/ping.c, net/ipv4/raw.c, net/ipv4/udp.c, net/ipv6/raw.c, and net/ipv6/udp.c.

The cifs_iovec_write function in fs/cifs/file.c in the Linux kernel through 3.13.5 does not properly handle uncached write operations that copy fewer than the requested number of bytes, which allows local users to obtain sensitive information from kernel memory, cause a denial of service (memory corruption and system crash), or possibly gain privileges via a writev system call with a crafted pointer.

Affected Packages:

kernel

Issue Correction:
Run yum update kernel to update your system. You will need to reboot your system in order for the new kernel to be running.

New Packages:

i686:  
    kernel-tools-3.4.82-69.112.amzn1.i686  
    kernel-tools-debuginfo-3.4.82-69.112.amzn1.i686  
    kernel-3.4.82-69.112.amzn1.i686  
    kernel-headers-3.4.82-69.112.amzn1.i686  
    kernel-debuginfo-common-i686-3.4.82-69.112.amzn1.i686  
    kernel-devel-3.4.82-69.112.amzn1.i686  
    kernel-debuginfo-3.4.82-69.112.amzn1.i686  
  
noarch:  
    kernel-doc-3.4.82-69.112.amzn1.noarch  
  
src:  
    kernel-3.4.82-69.112.amzn1.src  
  
x86_64:  
    kernel-headers-3.4.82-69.112.amzn1.x86_64  
    kernel-3.4.82-69.112.amzn1.x86_64  
    kernel-tools-debuginfo-3.4.82-69.112.amzn1.x86_64  
    kernel-debuginfo-common-x86_64-3.4.82-69.112.amzn1.x86_64  
    kernel-devel-3.4.82-69.112.amzn1.x86_64  
    kernel-debuginfo-3.4.82-69.112.amzn1.x86_64  
    kernel-tools-3.4.82-69.112.amzn1.x86_64  

Additional References

Red Hat: CVE-2013-7263, CVE-2013-7265, CVE-2014-0069, CVE-2014-1874

Mitre: CVE-2013-7263, CVE-2013-7265, CVE-2014-0069, CVE-2014-1874

CVSS2

7.2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

EPSS

0

Percentile

10.1%