[ALAS-2015-543] Amazon Linux AMI 2014.03 - ALAS-2015-543: medium priority package update for libcap-ng
Package updates are available for Amazon Linux AMI that fix the following vulnerabilities:
CVE-2014-3215:
A flaw was found in the way seunshare, a utility for running executables under a different security context, used the capng_lock functionality of the libcap-ng library. The subsequent invocation of suid root binaries that relied on the fact that the setuid() system call, among others, also sets the saved set-user-ID when dropping the binaries' process privileges, could allow a local, unprivileged user to potentially escalate their privileges on the system. Note: the fix for this issue is the kernel part of the overall fix, and introduces the PR_SET_NO_NEW_PRIVS functionality and the related SELinux exec transitions support.
1095855:
CVE-2014-3215 policycoreutils: local privilege escalation via seunshare
Package | Affected Version |
---|---|
pkg:rpm/amazonlinux/libcap-ng?arch=x86_64&distro=amazonlinux-1 | < 0.7.3-5.13.amzn1 |
pkg:rpm/amazonlinux/libcap-ng?arch=i686&distro=amazonlinux-1 | < 0.7.3-5.13.amzn1 |
pkg:rpm/amazonlinux/libcap-ng-utils?arch=x86_64&distro=amazonlinux-1 | < 0.7.3-5.13.amzn1 |
pkg:rpm/amazonlinux/libcap-ng-utils?arch=i686&distro=amazonlinux-1 | < 0.7.3-5.13.amzn1 |
pkg:rpm/amazonlinux/libcap-ng-python?arch=x86_64&distro=amazonlinux-1 | < 0.7.3-5.13.amzn1 |
pkg:rpm/amazonlinux/libcap-ng-python?arch=i686&distro=amazonlinux-1 | < 0.7.3-5.13.amzn1 |
pkg:rpm/amazonlinux/libcap-ng-devel?arch=x86_64&distro=amazonlinux-1 | < 0.7.3-5.13.amzn1 |
pkg:rpm/amazonlinux/libcap-ng-devel?arch=i686&distro=amazonlinux-1 | < 0.7.3-5.13.amzn1 |
pkg:rpm/amazonlinux/libcap-ng-debuginfo?arch=x86_64&distro=amazonlinux-1 | < 0.7.3-5.13.amzn1 |
pkg:rpm/amazonlinux/libcap-ng-debuginfo?arch=i686&distro=amazonlinux-1 | < 0.7.3-5.13.amzn1 |
- ID
- ALAS-2015-543
- Severity
- medium
- URL
- https://alas.aws.amazon.com/ALAS-2015-543.html
- Published
-
2015-06-16T10:27:00
(9 years ago) - Modified
-
2015-06-16T11:41:00
(9 years ago) - Rights
- Amazon Linux Security Team
- Other Advisories
Source | # ID | Name | URL |
---|---|---|---|
CVE | CVE-2014-3215 | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3215 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/amazonlinux/libcap-ng?arch=x86_64&distro=amazonlinux-1 | amazonlinux | libcap-ng | < 0.7.3-5.13.amzn1 | amazonlinux-1 | x86_64 | |
Affected | pkg:rpm/amazonlinux/libcap-ng?arch=i686&distro=amazonlinux-1 | amazonlinux | libcap-ng | < 0.7.3-5.13.amzn1 | amazonlinux-1 | i686 | |
Affected | pkg:rpm/amazonlinux/libcap-ng-utils?arch=x86_64&distro=amazonlinux-1 | amazonlinux | libcap-ng-utils | < 0.7.3-5.13.amzn1 | amazonlinux-1 | x86_64 | |
Affected | pkg:rpm/amazonlinux/libcap-ng-utils?arch=i686&distro=amazonlinux-1 | amazonlinux | libcap-ng-utils | < 0.7.3-5.13.amzn1 | amazonlinux-1 | i686 | |
Affected | pkg:rpm/amazonlinux/libcap-ng-python?arch=x86_64&distro=amazonlinux-1 | amazonlinux | libcap-ng-python | < 0.7.3-5.13.amzn1 | amazonlinux-1 | x86_64 | |
Affected | pkg:rpm/amazonlinux/libcap-ng-python?arch=i686&distro=amazonlinux-1 | amazonlinux | libcap-ng-python | < 0.7.3-5.13.amzn1 | amazonlinux-1 | i686 | |
Affected | pkg:rpm/amazonlinux/libcap-ng-devel?arch=x86_64&distro=amazonlinux-1 | amazonlinux | libcap-ng-devel | < 0.7.3-5.13.amzn1 | amazonlinux-1 | x86_64 | |
Affected | pkg:rpm/amazonlinux/libcap-ng-devel?arch=i686&distro=amazonlinux-1 | amazonlinux | libcap-ng-devel | < 0.7.3-5.13.amzn1 | amazonlinux-1 | i686 | |
Affected | pkg:rpm/amazonlinux/libcap-ng-debuginfo?arch=x86_64&distro=amazonlinux-1 | amazonlinux | libcap-ng-debuginfo | < 0.7.3-5.13.amzn1 | amazonlinux-1 | x86_64 | |
Affected | pkg:rpm/amazonlinux/libcap-ng-debuginfo?arch=i686&distro=amazonlinux-1 | amazonlinux | libcap-ng-debuginfo | < 0.7.3-5.13.amzn1 | amazonlinux-1 | i686 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |