ALAS-2014-368

Related Vulnerabilities: CVE-2014-0206   CVE-2014-4014   CVE-2014-4508   CVE-2014-4608  

arch/x86/kernel/entry_32.S in the Linux kernel through 3.15.1 on 32-bit x86 platforms, when syscall auditing is enabled and the sep CPU feature flag is set, allows local users to cause a denial of service (OOPS and system crash) via an invalid syscall number, as demonstrated by number 1000. Array index error in the aio_read_events_ring function in fs/aio.c in the Linux kernel through 3.15.1 allows local users to obtain sensitive information from kernel memory via a large head value. The capabilities implementation in the Linux kernel before 3.14.8 does not properly consider that namespaces are inapplicable to inodes, which allows local users to bypass intended chmod restrictions by first creating a user namespace, as demonstrated by setting the setgid bit on a file with group ownership of root. ** DISPUTED ** Multiple integer overflows in the lzo1x_decompress_safe function in lib/lzo/lzo1x_decompress_safe.c in the LZO decompressor in the Linux kernel before 3.15.2 allow context-dependent attackers to cause a denial of service (memory corruption) via a crafted Literal Run. NOTE: the author of the LZO algorithms says "the Linux kernel is *not* affected; media hype."

ALAS-2014-368


Amazon Linux AMI Security Advisory: ALAS-2014-368
Advisory Release Date: 2014-07-09 16:29 Pacific
Advisory Updated Date: 2014-09-19 10:33 Pacific
Severity: Medium

Issue Overview:

arch/x86/kernel/entry_32.S in the Linux kernel through 3.15.1 on 32-bit x86 platforms, when syscall auditing is enabled and the sep CPU feature flag is set, allows local users to cause a denial of service (OOPS and system crash) via an invalid syscall number, as demonstrated by number 1000.

Array index error in the aio_read_events_ring function in fs/aio.c in the Linux kernel through 3.15.1 allows local users to obtain sensitive information from kernel memory via a large head value.

The capabilities implementation in the Linux kernel before 3.14.8 does not properly consider that namespaces are inapplicable to inodes, which allows local users to bypass intended chmod restrictions by first creating a user namespace, as demonstrated by setting the setgid bit on a file with group ownership of root.

** DISPUTED ** Multiple integer overflows in the lzo1x_decompress_safe function in lib/lzo/lzo1x_decompress_safe.c in the LZO decompressor in the Linux kernel before 3.15.2 allow context-dependent attackers to cause a denial of service (memory corruption) via a crafted Literal Run. NOTE: the author of the LZO algorithms says "the Linux kernel is *not* affected; media hype."


Affected Packages:

kernel


Issue Correction:
Run yum update kernel to update your system. You will need to reboot your system in order for the new kernel to be running.

New Packages:
i686:
    kernel-devel-3.10.48-55.140.amzn1.i686
    perf-debuginfo-3.10.48-55.140.amzn1.i686
    kernel-3.10.48-55.140.amzn1.i686
    kernel-headers-3.10.48-55.140.amzn1.i686
    kernel-debuginfo-3.10.48-55.140.amzn1.i686
    perf-3.10.48-55.140.amzn1.i686
    kernel-debuginfo-common-i686-3.10.48-55.140.amzn1.i686

noarch:
    kernel-doc-3.10.48-55.140.amzn1.noarch

src:
    kernel-3.10.48-55.140.amzn1.src

x86_64:
    kernel-debuginfo-3.10.48-55.140.amzn1.x86_64
    kernel-headers-3.10.48-55.140.amzn1.x86_64
    kernel-3.10.48-55.140.amzn1.x86_64
    kernel-devel-3.10.48-55.140.amzn1.x86_64
    kernel-debuginfo-common-x86_64-3.10.48-55.140.amzn1.x86_64
    perf-debuginfo-3.10.48-55.140.amzn1.x86_64
    perf-3.10.48-55.140.amzn1.x86_64