ALAS2LIVEPATCH-2020-025


Amazon Linux 2 Security Advisory: ALASLIVEPATCH-2020-025
Advisory Release Date: 2020-09-04 17:55 Pacific
Advisory Updated Date: 2020-09-10 19:20 Pacific
Severity: Important

Issue Overview:

An issue has been reported in the Linux kernel's handling of raw sockets. This issue can be used locally to cause denial of service or local privilege escalation from unprivileged processes or from containers with the CAP_NET_RAW capability enabled.

See Also:

https://marc.info/?l=linux-netdev&m=159915549623724&w=2
https://www.openwall.com/lists/oss-security/2020/09/03/3
https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-14386 (CVE-2020-14386)

A logic bug flaw was found in the Linux kernel's implementation of SSBD. A bug in the logic handling allows an attacker with a local account to disable SSBD protection during a context switch when additional speculative execution mitigations are in place. This issue was introduced when the per task/process conditional STIPB switching was added on top of the existing SSBD switching. The highest threat from this vulnerability is to confidentiality. (CVE-2020-10766)

A flaw was found in the Linux kernel's implementation of the Enhanced IBPB (Indirect Branch Prediction Barrier). The IBPB mitigation will be disabled when STIBP is not available or when the Enhanced Indirect Branch Restricted Speculation (IBRS) is available. This flaw allows a local attacker to perform a Spectre V2 style attack when this configuration is active. The highest threat from this vulnerability is to confidentiality. (CVE-2020-10767)

A flaw was found in the prctl() function, where it can be used to enable indirect branch speculation after it has been disabled. This call incorrectly reports it as being 'force disabled' when it is not and opens the system to Spectre v2 attacks. The highest threat from this vulnerability is to confidentiality. (CVE-2020-10768)

An issue was discovered in xfs_agf_verify in fs/xfs/libxfs/xfs_alloc.c in the Linux kernel through 5.6.10. Attackers may trigger a sync of excessive duration via an XFS v5 image with crafted metadata, aka CID-d0c7feaf8767. (CVE-2020-12655 )


Affected Packages:

kernel-livepatch-4.14.181-142.260


Issue Correction:
Please ensure you have live patching enabled.
Run yum update kernel-livepatch-4.14.181-142.260 to update your system.

New Packages:
src:
    kernel-livepatch-4.14.181-142.260-1.0-4.amzn2.src

x86_64:
    kernel-livepatch-4.14.181-142.260-1.0-4.amzn2.x86_64
    kernel-livepatch-4.14.181-142.260-debuginfo-1.0-4.amzn2.x86_64