Description: | Summary: The remote host is missing an update for the 'kernel' package(s) announced via the ALAS-2016-703 advisory.
Vulnerability Insight: The Linux kernel did not properly suppress hugetlbfs support in x86 PV guests, which could allow local PV guest users to cause a denial of service (guest OS crash) by attempting to access a hugetlbfs mapped area. (CVE-2016-3961 / XSA-174)
A flaw was found in the way the Linux kernel's ASN.1 DER decoder processed certain certificate files with tags of indefinite length. A local, unprivileged user could use a specially crafted X.509 certificate DER file to crash the system or, potentially, escalate their privileges on the system. (CVE-2016-0758)
Multiple race conditions in the ext4 filesystem implementation in the Linux kernel before 4.5 allow local users to cause a denial of service (disk corruption) by writing to a page that is associated with a different user's file after unsynchronized hole punching and page-fault handling. (CVE-2015-8839)
The following flaws were also fixed in this version:
CVE-2016-4557: Use after free vulnerability via double fdput CVE-2016-4581: Slave being first propagated copy causes oops in propagate_mnt CVE-2016-4486: Information leak in rtnetlink CVE-2016-4485: Information leak in llc module CVE-2016-4558: bpf: refcnt overflow CVE-2016-4565: infiniband: Unprivileged process can overwrite kernel memory using rdma_ucm.ko CVE-2016-0758: tags with indefinite length can corrupt pointers in asn1_find_indefinite_length() CVE-2015-8839: ext4 filesystem page fault race condition with fallocate call.
Affected Software/OS: 'kernel' package(s) on Amazon Linux.
Solution: Please install the updated package(s).
CVSS Score: 7.2
CVSS Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C
|