[ALAS-2016-694] Amazon Linux AMI 2014.03 - ALAS-2016-694: medium priority package update for kernel
Package updates are available for Amazon Linux AMI that fix the following vulnerabilities:
CVE-2016-7117:
A use-after-free vulnerability was found in the kernel's socket recvmmsg subsystem. This may allow remote attackers to corrupt memory and may allow execution of arbitrary code. This corruption takes place during the error handling routines within __sys_recvmmsg() function.
1382268:
CVE-2016-7117 kernel: Use-after-free in the recvmmsg exit path
CVE-2016-3672:
1324749:
CVE-2016-3672 kernel: unlimiting the stack disables ASLR
CVE-2016-3156:
1318172:
CVE-2016-3156 kernel: ipv4: denial of service when destroying a network interface
CVE-2016-3135:
1317386:
CVE-2016-3135 kernel: netfilter: size overflow in x_tables
CVE-2016-3134:
1317383:
CVE-2016-3134 kernel: netfilter: missing bounds check in ipt_entry structure
- ID
- ALAS-2016-694
- Severity
- medium
- URL
- https://alas.aws.amazon.com/ALAS-2016-694.html
- Published
-
2016-04-27T16:15:00
(8 years ago) - Modified
-
2017-01-19T16:30:00
(7 years ago) - Rights
- Amazon Linux Security Team
- Other Advisories
-
- DSA-3607-1
- ELSA-2016-1847
- ELSA-2016-2574
- ELSA-2016-2962
- ELSA-2016-3596
- ELSA-2016-3623
- ELSA-2016-3624
- ELSA-2016-3625
- ELSA-2016-3655
- ELSA-2016-3656
- ELSA-2016-3657
- ELSA-2017-0036
- ELSA-2017-0086
- ELSA-2017-3533
- ELSA-2017-3534
- ELSA-2017-3535
- ELSA-2018-1062
- FEDORA-2016-02ed08bf15
- FEDORA-2016-373c063e79
- FEDORA-2016-3a57b19360
- FEDORA-2016-76706f51a7
- FEDORA-2016-81fd1b03aa
- FEDORA-2016-8e858f96b8
- RHSA-2016:1847
- RHSA-2016:1875
- RHSA-2016:2574
- RHSA-2016:2584
- RHSA-2017:0036
- RHSA-2017:0086
- RHSA-2017:0091
- RHSA-2018:0676
- RHSA-2018:1062
- SUSE-SU-2016:1019-1
- SUSE-SU-2016:1203-1
- SUSE-SU-2016:1672-1
- SUSE-SU-2016:1690-1
- SUSE-SU-2016:1696-1
- SUSE-SU-2016:1707-1
- SUSE-SU-2016:1764-1
- SUSE-SU-2016:1937-1
- SUSE-SU-2016:1961-1
- SUSE-SU-2016:1985-1
- SUSE-SU-2016:1994-1
- SUSE-SU-2016:1995-1
- SUSE-SU-2016:2000-1
- SUSE-SU-2016:2001-1
- SUSE-SU-2016:2002-1
- SUSE-SU-2016:2005-1
- SUSE-SU-2016:2006-1
- SUSE-SU-2016:2007-1
- SUSE-SU-2016:2009-1
- SUSE-SU-2016:2010-1
- SUSE-SU-2016:2014-1
- SUSE-SU-2016:2074-1
- SUSE-SU-2016:2105-1
- SUSE-SU-2016:2245-1
- SUSE-SU-2016:2976-1
- SUSE-SU-2016:3093-1
- SUSE-SU-2016:3094-1
- SUSE-SU-2016:3098-1
- SUSE-SU-2016:3100-1
- SUSE-SU-2016:3104-1
- SUSE-SU-2016:3109-1
- SUSE-SU-2016:3111-1
- SUSE-SU-2016:3112-1
- SUSE-SU-2016:3119-1
- SUSE-SU-2016:3249-1
- SUSE-SU-2017:0333-1
- SUSE-SU-2017:0494-1
- SUSE-SU-2017:0575-1
- SUSE-SU-2017:1102-1
- SUSE-SU-2017:1247-1
- SUSE-SU-2017:1360-1
- SUSE-SU-2017:1990-1
- SUSE-SU-2017:2342-1
- USN-2929-1
- USN-2929-2
- USN-2930-1
- USN-2930-2
- USN-2930-3
- USN-2931-1
- USN-2932-1
- USN-2965-1
- USN-2965-2
- USN-2965-3
- USN-2965-4
- USN-2968-1
- USN-2968-2
- USN-2969-1
- USN-2970-1
- USN-2971-1
- USN-2971-2
- USN-2971-3
- USN-2989-1
- USN-2996-1
- USN-2997-1
- USN-2998-1
- USN-3000-1
- USN-3001-1
- USN-3002-1
- USN-3003-1
- USN-3004-1
- USN-3049-1
- USN-3050-1
- USN-3054-1
- USN-3055-1
- USN-3056-1
- USN-3057-1
- USN-3126-1
- USN-3126-2
Source | # ID | Name | URL |
---|---|---|---|
CVE | CVE-2016-3134 | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3134 | |
CVE | CVE-2016-3135 | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3135 | |
CVE | CVE-2016-3156 | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3156 | |
CVE | CVE-2016-3672 | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3672 | |
CVE | CVE-2016-7117 | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-7117 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/amazonlinux/perf?arch=x86_64&distro=amazonlinux-1 | amazonlinux | perf | < 4.4.8-20.46.amzn1 | amazonlinux-1 | x86_64 | |
Affected | pkg:rpm/amazonlinux/perf?arch=i686&distro=amazonlinux-1 | amazonlinux | perf | < 4.4.8-20.46.amzn1 | amazonlinux-1 | i686 | |
Affected | pkg:rpm/amazonlinux/perf-debuginfo?arch=x86_64&distro=amazonlinux-1 | amazonlinux | perf-debuginfo | < 4.4.8-20.46.amzn1 | amazonlinux-1 | x86_64 | |
Affected | pkg:rpm/amazonlinux/perf-debuginfo?arch=i686&distro=amazonlinux-1 | amazonlinux | perf-debuginfo | < 4.4.8-20.46.amzn1 | amazonlinux-1 | i686 | |
Affected | pkg:rpm/amazonlinux/kernel?arch=x86_64&distro=amazonlinux-1 | amazonlinux | kernel | < 4.4.8-20.46.amzn1 | amazonlinux-1 | x86_64 | |
Affected | pkg:rpm/amazonlinux/kernel?arch=i686&distro=amazonlinux-1 | amazonlinux | kernel | < 4.4.8-20.46.amzn1 | amazonlinux-1 | i686 | |
Affected | pkg:rpm/amazonlinux/kernel-tools?arch=x86_64&distro=amazonlinux-1 | amazonlinux | kernel-tools | < 4.4.8-20.46.amzn1 | amazonlinux-1 | x86_64 | |
Affected | pkg:rpm/amazonlinux/kernel-tools?arch=i686&distro=amazonlinux-1 | amazonlinux | kernel-tools | < 4.4.8-20.46.amzn1 | amazonlinux-1 | i686 | |
Affected | pkg:rpm/amazonlinux/kernel-tools-devel?arch=x86_64&distro=amazonlinux-1 | amazonlinux | kernel-tools-devel | < 4.4.8-20.46.amzn1 | amazonlinux-1 | x86_64 | |
Affected | pkg:rpm/amazonlinux/kernel-tools-devel?arch=i686&distro=amazonlinux-1 | amazonlinux | kernel-tools-devel | < 4.4.8-20.46.amzn1 | amazonlinux-1 | i686 | |
Affected | pkg:rpm/amazonlinux/kernel-tools-debuginfo?arch=x86_64&distro=amazonlinux-1 | amazonlinux | kernel-tools-debuginfo | < 4.4.8-20.46.amzn1 | amazonlinux-1 | x86_64 | |
Affected | pkg:rpm/amazonlinux/kernel-tools-debuginfo?arch=i686&distro=amazonlinux-1 | amazonlinux | kernel-tools-debuginfo | < 4.4.8-20.46.amzn1 | amazonlinux-1 | i686 | |
Affected | pkg:rpm/amazonlinux/kernel-headers?arch=x86_64&distro=amazonlinux-1 | amazonlinux | kernel-headers | < 4.4.8-20.46.amzn1 | amazonlinux-1 | x86_64 | |
Affected | pkg:rpm/amazonlinux/kernel-headers?arch=i686&distro=amazonlinux-1 | amazonlinux | kernel-headers | < 4.4.8-20.46.amzn1 | amazonlinux-1 | i686 | |
Affected | pkg:rpm/amazonlinux/kernel-doc?arch=noarch&distro=amazonlinux-1 | amazonlinux | kernel-doc | < 4.4.8-20.46.amzn1 | amazonlinux-1 | noarch | |
Affected | pkg:rpm/amazonlinux/kernel-devel?arch=x86_64&distro=amazonlinux-1 | amazonlinux | kernel-devel | < 4.4.8-20.46.amzn1 | amazonlinux-1 | x86_64 | |
Affected | pkg:rpm/amazonlinux/kernel-devel?arch=i686&distro=amazonlinux-1 | amazonlinux | kernel-devel | < 4.4.8-20.46.amzn1 | amazonlinux-1 | i686 | |
Affected | pkg:rpm/amazonlinux/kernel-debuginfo?arch=x86_64&distro=amazonlinux-1 | amazonlinux | kernel-debuginfo | < 4.4.8-20.46.amzn1 | amazonlinux-1 | x86_64 | |
Affected | pkg:rpm/amazonlinux/kernel-debuginfo?arch=i686&distro=amazonlinux-1 | amazonlinux | kernel-debuginfo | < 4.4.8-20.46.amzn1 | amazonlinux-1 | i686 | |
Affected | pkg:rpm/amazonlinux/kernel-debuginfo-common-x86_64?arch=x86_64&distro=amazonlinux-1 | amazonlinux | kernel-debuginfo-common-x86_64 | < 4.4.8-20.46.amzn1 | amazonlinux-1 | x86_64 | |
Affected | pkg:rpm/amazonlinux/kernel-debuginfo-common-i686?arch=i686&distro=amazonlinux-1 | amazonlinux | kernel-debuginfo-common-i686 | < 4.4.8-20.46.amzn1 | amazonlinux-1 | i686 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |