[ALAS-2014-455] Amazon Linux AMI 2014.03 - ALAS-2014-455: medium priority package update for kernel
Package updates are available for Amazon Linux AMI that fix the following vulnerabilities:
CVE-2014-9322:
A flaw was found in the way the Linux kernel handled GS segment register base switching when recovering from a #SS (stack segment) fault on an erroneous return to user space. A local, unprivileged user could use this flaw to escalate their privileges on the system.
1172806:
CVE-2014-9322 kernel: x86: local privesc due to bad_iret and paranoid entry incompatibility
CVE-2014-9090:
The do_double_fault function in arch/x86/kernel/traps.c in the Linux kernel through 3.17.4 does not properly handle faults associated with the Stack Segment (SS) segment register, which allows local users to cause a denial of service (panic) via a modify_ldt system call, as demonstrated by sigreturn_32 in the linux-clock-tests test suite.
1170691:
CVE-2014-9090 kernel: espfix64: local DoS via do_double_fault() due to improper handling of faults associated with SS segment register
CVE-2014-7970:
The pivot_root implementation in fs/namespace.c in the Linux kernel through 3.17 does not properly interact with certain locations of a chroot directory, which allows local users to cause a denial of service (mount-tree loop) via . (dot) values in both arguments to the pivot_root system call.
1151095:
CVE-2014-7970 Kernel: fs: VFS denial of service
CVE-2014-7841:
The sctp_process_param function in net/sctp/sm_make_chunk.c in the SCTP implementation in the Linux kernel before 3.17.4, when ASCONF is used, allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) via a malformed INIT chunk.
1163087:
CVE-2014-7841 kernel: net: sctp: NULL pointer dereference in af->from_addr_param on malformed packet
- ID
- ALAS-2014-455
- Severity
- medium
- URL
- https://alas.aws.amazon.com/ALAS-2014-455.html
- Published
-
2014-12-03T22:27:00
(9 years ago) - Modified
-
2014-12-18T14:55:00
(9 years ago) - Rights
- Amazon Linux Security Team
- Other Advisories
-
- DSA-3093-1
- ELSA-2014-1997
- ELSA-2014-2008
- ELSA-2014-2010
- ELSA-2014-3106
- ELSA-2014-3107
- ELSA-2014-3108
- ELSA-2015-0087
- ELSA-2015-0102
- ELSA-2015-3003
- ELSA-2015-3004
- ELSA-2015-3005
- ELSA-2017-1842
- ELSA-2018-4301
- FEDORA-2014-12955
- FEDORA-2014-13020
- FEDORA-2014-13045
- FEDORA-2014-13558
- FEDORA-2014-13773
- FEDORA-2014-14068
- FEDORA-2014-15159
- FEDORA-2014-15200
- FEDORA-2014-16448
- FEDORA-2014-16632
- FEDORA-2014-17244
- FEDORA-2014-17283
- FEDORA-2014-17293
- FEDORA-2015-0515
- FEDORA-2015-0517
- FEDORA-2015-0937
- FEDORA-2015-10678
- FEDORA-2015-12917
- FEDORA-2015-13391
- FEDORA-2015-1657
- FEDORA-2015-1672
- FEDORA-2015-3011
- FEDORA-2015-3594
- FEDORA-2015-4059
- FEDORA-2015-4457
- FEDORA-2015-5024
- FEDORA-2015-6294
- FEDORA-2015-6320
- FEDORA-2015-7736
- FEDORA-2015-8518
- FEDORA-2015-9127
- FEDORA-2015-9704
- RHSA-2014:1997
- RHSA-2014:2010
- RHSA-2015:0087
- RHSA-2015:0102
- RHSA-2017:1842
- RHSA-2017:2077
- SUSE-SU-2015:0481-1
- SUSE-SU-2015:0529-1
- SUSE-SU-2015:0581-1
- SUSE-SU-2015:0652-1
- SUSE-SU-2015:0736-1
- SUSE-SU-2015:1174-1
- SUSE-SU-2015:1376-1
- USN-2419-1
- USN-2420-1
- USN-2441-1
- USN-2442-1
- USN-2443-1
- USN-2444-1
- USN-2445-1
- USN-2446-1
- USN-2447-1
- USN-2448-1
- USN-2462-1
- USN-2464-1
- USN-2465-1
- USN-2466-1
- USN-2467-1
- USN-2468-1
- USN-2491-1
- USN-2513-1
- USN-2514-1
Source | # ID | Name | URL |
---|---|---|---|
CVE | CVE-2014-7841 | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7841 | |
CVE | CVE-2014-7970 | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7970 | |
CVE | CVE-2014-9090 | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9090 | |
CVE | CVE-2014-9322 | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9322 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/amazonlinux/perf?arch=x86_64&distro=amazonlinux-1 | amazonlinux | perf | < 3.14.26-24.46.amzn1 | amazonlinux-1 | x86_64 | |
Affected | pkg:rpm/amazonlinux/perf?arch=i686&distro=amazonlinux-1 | amazonlinux | perf | < 3.14.26-24.46.amzn1 | amazonlinux-1 | i686 | |
Affected | pkg:rpm/amazonlinux/perf-debuginfo?arch=x86_64&distro=amazonlinux-1 | amazonlinux | perf-debuginfo | < 3.14.26-24.46.amzn1 | amazonlinux-1 | x86_64 | |
Affected | pkg:rpm/amazonlinux/perf-debuginfo?arch=i686&distro=amazonlinux-1 | amazonlinux | perf-debuginfo | < 3.14.26-24.46.amzn1 | amazonlinux-1 | i686 | |
Affected | pkg:rpm/amazonlinux/kernel?arch=x86_64&distro=amazonlinux-1 | amazonlinux | kernel | < 3.14.26-24.46.amzn1 | amazonlinux-1 | x86_64 | |
Affected | pkg:rpm/amazonlinux/kernel?arch=i686&distro=amazonlinux-1 | amazonlinux | kernel | < 3.14.26-24.46.amzn1 | amazonlinux-1 | i686 | |
Affected | pkg:rpm/amazonlinux/kernel-tools?arch=x86_64&distro=amazonlinux-1 | amazonlinux | kernel-tools | < 3.14.26-24.46.amzn1 | amazonlinux-1 | x86_64 | |
Affected | pkg:rpm/amazonlinux/kernel-tools?arch=i686&distro=amazonlinux-1 | amazonlinux | kernel-tools | < 3.14.26-24.46.amzn1 | amazonlinux-1 | i686 | |
Affected | pkg:rpm/amazonlinux/kernel-tools-devel?arch=x86_64&distro=amazonlinux-1 | amazonlinux | kernel-tools-devel | < 3.14.26-24.46.amzn1 | amazonlinux-1 | x86_64 | |
Affected | pkg:rpm/amazonlinux/kernel-tools-devel?arch=i686&distro=amazonlinux-1 | amazonlinux | kernel-tools-devel | < 3.14.26-24.46.amzn1 | amazonlinux-1 | i686 | |
Affected | pkg:rpm/amazonlinux/kernel-tools-debuginfo?arch=x86_64&distro=amazonlinux-1 | amazonlinux | kernel-tools-debuginfo | < 3.14.26-24.46.amzn1 | amazonlinux-1 | x86_64 | |
Affected | pkg:rpm/amazonlinux/kernel-tools-debuginfo?arch=i686&distro=amazonlinux-1 | amazonlinux | kernel-tools-debuginfo | < 3.14.26-24.46.amzn1 | amazonlinux-1 | i686 | |
Affected | pkg:rpm/amazonlinux/kernel-headers?arch=x86_64&distro=amazonlinux-1 | amazonlinux | kernel-headers | < 3.14.26-24.46.amzn1 | amazonlinux-1 | x86_64 | |
Affected | pkg:rpm/amazonlinux/kernel-headers?arch=i686&distro=amazonlinux-1 | amazonlinux | kernel-headers | < 3.14.26-24.46.amzn1 | amazonlinux-1 | i686 | |
Affected | pkg:rpm/amazonlinux/kernel-doc?arch=noarch&distro=amazonlinux-1 | amazonlinux | kernel-doc | < 3.14.26-24.46.amzn1 | amazonlinux-1 | noarch | |
Affected | pkg:rpm/amazonlinux/kernel-devel?arch=x86_64&distro=amazonlinux-1 | amazonlinux | kernel-devel | < 3.14.26-24.46.amzn1 | amazonlinux-1 | x86_64 | |
Affected | pkg:rpm/amazonlinux/kernel-devel?arch=i686&distro=amazonlinux-1 | amazonlinux | kernel-devel | < 3.14.26-24.46.amzn1 | amazonlinux-1 | i686 | |
Affected | pkg:rpm/amazonlinux/kernel-debuginfo?arch=x86_64&distro=amazonlinux-1 | amazonlinux | kernel-debuginfo | < 3.14.26-24.46.amzn1 | amazonlinux-1 | x86_64 | |
Affected | pkg:rpm/amazonlinux/kernel-debuginfo?arch=i686&distro=amazonlinux-1 | amazonlinux | kernel-debuginfo | < 3.14.26-24.46.amzn1 | amazonlinux-1 | i686 | |
Affected | pkg:rpm/amazonlinux/kernel-debuginfo-common-x86_64?arch=x86_64&distro=amazonlinux-1 | amazonlinux | kernel-debuginfo-common-x86_64 | < 3.14.26-24.46.amzn1 | amazonlinux-1 | x86_64 | |
Affected | pkg:rpm/amazonlinux/kernel-debuginfo-common-i686?arch=i686&distro=amazonlinux-1 | amazonlinux | kernel-debuginfo-common-i686 | < 3.14.26-24.46.amzn1 | amazonlinux-1 | i686 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |