Amazon Linux 1 Security Advisory: ALAS-2014-317
Advisory Release Date: 2014-03-24 23:39 Pacific
Advisory Updated Date: 2014-09-18 00:06 Pacific
The sctp_sf_do_5_1D_ce function in net/sctp/sm_statefuns.c in the Linux kernel through 3.13.6 does not validate certain auth_enable and auth_capable fields before making an sctp_sf_authenticate call, which allows remote attackers to cause a denial of service (NULL pointer dereference and system crash) via an SCTP handshake with a modified INIT chunk and a crafted AUTH chunk before a COOKIE_ECHO chunk.
Affected Packages:
kernel
Issue Correction:
Run yum update kernel to update your system. You will need to reboot your system in order for the new kernel to be running.
i686:
kernel-headers-3.10.34-37.137.amzn1.i686
kernel-debuginfo-3.10.34-37.137.amzn1.i686
perf-debuginfo-3.10.34-37.137.amzn1.i686
perf-3.10.34-37.137.amzn1.i686
kernel-devel-3.10.34-37.137.amzn1.i686
kernel-3.10.34-37.137.amzn1.i686
kernel-debuginfo-common-i686-3.10.34-37.137.amzn1.i686
noarch:
kernel-doc-3.10.34-37.137.amzn1.noarch
src:
kernel-3.10.34-37.137.amzn1.src
x86_64:
kernel-headers-3.10.34-37.137.amzn1.x86_64
kernel-debuginfo-3.10.34-37.137.amzn1.x86_64
kernel-debuginfo-common-x86_64-3.10.34-37.137.amzn1.x86_64
perf-3.10.34-37.137.amzn1.x86_64
perf-debuginfo-3.10.34-37.137.amzn1.x86_64
kernel-3.10.34-37.137.amzn1.x86_64
kernel-devel-3.10.34-37.137.amzn1.x86_64