Amazon Linux 1 (EOL) Security Advisory: ALAS-2015-476
Advisory Released Date: 2015-02-11
Advisory Updated Date: 2015-02-11
The Linux kernel through 3.17.4 does not properly restrict dropping of supplemental group memberships in certain namespace scenarios, which allows local users to bypass intended file permissions by leveraging a POSIX ACL containing an entry for the group category that is more restrictive than the entry for the other category, aka a "negative groups" issue, related to kernel/groups.c, kernel/uid16.c, and kernel/user_namespace.c. (CVE-2014-8989)
A flaw was found in the way the Linux kernel's splice() system call validated its parameters. On certain file systems, a local, unprivileged user could use this flaw to write past the maximum file size, and thus crash the system. (CVE-2014-7822)
Affected Packages:
kernel
Issue Correction:
Run yum update kernel or yum update --advisory ALAS-2015-476 to update your system.Run yum clean all followed by yum update kernel to update your system. You will need to reboot your system in order for the new kernel to be running.
i686:
perf-debuginfo-3.14.33-26.47.amzn1.i686
perf-3.14.33-26.47.amzn1.i686
kernel-tools-debuginfo-3.14.33-26.47.amzn1.i686
kernel-tools-devel-3.14.33-26.47.amzn1.i686
kernel-debuginfo-3.14.33-26.47.amzn1.i686
kernel-debuginfo-common-i686-3.14.33-26.47.amzn1.i686
kernel-devel-3.14.33-26.47.amzn1.i686
kernel-headers-3.14.33-26.47.amzn1.i686
kernel-3.14.33-26.47.amzn1.i686
kernel-tools-3.14.33-26.47.amzn1.i686
noarch:
kernel-doc-3.14.33-26.47.amzn1.noarch
src:
kernel-3.14.33-26.47.amzn1.src
x86_64:
kernel-devel-3.14.33-26.47.amzn1.x86_64
kernel-tools-devel-3.14.33-26.47.amzn1.x86_64
perf-3.14.33-26.47.amzn1.x86_64
kernel-tools-3.14.33-26.47.amzn1.x86_64
kernel-3.14.33-26.47.amzn1.x86_64
kernel-headers-3.14.33-26.47.amzn1.x86_64
perf-debuginfo-3.14.33-26.47.amzn1.x86_64
kernel-tools-debuginfo-3.14.33-26.47.amzn1.x86_64
kernel-debuginfo-3.14.33-26.47.amzn1.x86_64
kernel-debuginfo-common-x86_64-3.14.33-26.47.amzn1.x86_64