ALAS-2016-726

Related Vulnerabilities: CVE-2016-1237   CVE-2016-4470   CVE-2016-5243   CVE-2016-5244   CVE-2016-5696  

It was found that nfsd is missing permissions check when setting ACL on files, this may allow a local users to gain access to any file by setting a crafted ACL. (CVE-2016-1237) A flaw was found in the Linux kernel's keyring handling code, where in key_reject_and_link() an uninitialised variable would eventually lead to arbitrary free address which could allow attacker to use a use-after-free style attack. (CVE-2016-4470) A leak of information was possible when issuing a netlink command of the stack memory area leading up to this function call. An attacker could use this to determine stack information for use in a later exploit. (CVE-2016-5243) A vulnerability was found in the Linux kernel in function rds_inc_info_copy of file net/rds/recv.c. The last field "flags" of object "minfo" is not initialized. This can leak data previously at the flags location to userspace. (CVE-2016-5244) A flaw was found in the implementation of the Linux kernel's handling of networking challenge ack where an attacker is able to determine the shared counter which could be used to determine sequence numbers for TCP stream injection. (CVE-2016-5696) (Updated on 2016-08-17: CVE-2016-5696 was fixed in this release but was not previously part of this errata)

ALAS-2016-726


Amazon Linux AMI Security Advisory: ALAS-2016-726
Advisory Release Date: 2016-08-01 13:30 Pacific
Advisory Updated Date: 2016-08-17 13:30 Pacific
Severity: Medium

Issue Overview:

It was found that nfsd is missing permissions check when setting ACL on files, this may allow a local users to gain access to any file by setting a crafted ACL. (CVE-2016-1237)

A flaw was found in the Linux kernel's keyring handling code, where in key_reject_and_link() an uninitialised variable would eventually lead to arbitrary free address which could allow attacker to use a use-after-free style attack. (CVE-2016-4470)

A leak of information was possible when issuing a netlink command of the stack memory area leading up to this function call. An attacker could use this to determine stack information for use in a later exploit. (CVE-2016-5243)

A vulnerability was found in the Linux kernel in function rds_inc_info_copy of file net/rds/recv.c. The last field "flags" of object "minfo" is not initialized. This can leak data previously at the flags location to userspace. (CVE-2016-5244)

A flaw was found in the implementation of the Linux kernel's handling of networking challenge ack where an attacker is able to determine the shared counter which could be used to determine sequence numbers for TCP stream injection. (CVE-2016-5696)

(Updated on 2016-08-17: CVE-2016-5696 was fixed in this release but was not previously part of this errata)


Affected Packages:

kernel


Issue Correction:
Run yum update kernel to update your system.

New Packages:
i686:
    perf-debuginfo-4.4.15-25.57.amzn1.i686
    kernel-tools-devel-4.4.15-25.57.amzn1.i686
    kernel-debuginfo-4.4.15-25.57.amzn1.i686
    perf-4.4.15-25.57.amzn1.i686
    kernel-debuginfo-common-i686-4.4.15-25.57.amzn1.i686
    kernel-4.4.15-25.57.amzn1.i686
    kernel-headers-4.4.15-25.57.amzn1.i686
    kernel-tools-debuginfo-4.4.15-25.57.amzn1.i686
    kernel-tools-4.4.15-25.57.amzn1.i686
    kernel-devel-4.4.15-25.57.amzn1.i686

noarch:
    kernel-doc-4.4.15-25.57.amzn1.noarch

src:
    kernel-4.4.15-25.57.amzn1.src

x86_64:
    kernel-headers-4.4.15-25.57.amzn1.x86_64
    kernel-tools-devel-4.4.15-25.57.amzn1.x86_64
    kernel-devel-4.4.15-25.57.amzn1.x86_64
    kernel-tools-debuginfo-4.4.15-25.57.amzn1.x86_64
    perf-4.4.15-25.57.amzn1.x86_64
    kernel-tools-4.4.15-25.57.amzn1.x86_64
    kernel-debuginfo-common-x86_64-4.4.15-25.57.amzn1.x86_64
    kernel-debuginfo-4.4.15-25.57.amzn1.x86_64
    kernel-4.4.15-25.57.amzn1.x86_64
    perf-debuginfo-4.4.15-25.57.amzn1.x86_64