Synopsis
The remote Fedora host is missing a security update.
Description
Update to kernel 2.6.25.6:
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25.5 http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25.6 CVE-2008-1673: The asn1 implementation in (a) the Linux kernel 2.4 before 2.4.36.6 and 2.6 before 2.6.25.5, as used in the cifs and ip_nat_snmp_basic modules; and (b) the gxsnmp package; does not properly validate length values during decoding of ASN.1 BER data, which allows remote attackers to cause a denial of service (crash) or execute arbitrary code via (1) a length greater than the working buffer, which can lead to an unspecified overflow; (2) an oid length of zero, which can lead to an off-by-one error; or (3) an indefinite length for a primitive encoding. Bugs fixed: 224005 - pata_pcmcia fails 326411 - Freeze On Boot w/ Audigy PCMCIA 450332 - F8 - System Lockup after kernel 2.6.25.4-10 450499 - kernel-2.6.25.4-10.fc8 breaks setkey -m tunnel options in ipsec 450501
- User Mode Linux (UML) broken on Fedora 9 (and now F8, too) Additional bugs fixed: F9#447518 - Call to capget() overflows buffers F9#450191 - DMA mode disabled for DVD drive, reverts to PIO4 F9#439197 - thinkpad x61t crash when undocking F9#447812 - Netlink messages from 'tc' to sch_netem module are not interpreted correctly F9#449817
- SD card reader causes kernel panic during startup if card inserted Additional updates/fixes: - Fix oops in lirc_i2c module - Add lirc support for additional MCE receivers - Upstream wireless updates from 2008-05-22 (http://marc.info/?l=linux- wireless&m=121146112404515&w=2) - Upstream wireless fixes from 2008-05-28 (http://marc.info/?l=linux-wireless&m=121201250110162&w= 2) - Upstream wireless fixes from 2008-06-03 (http://marc.info/?l=linux- wireless&m=121252137324941&w=2) - Upstream wireless fixes from 2008-06-09 (http://marc.info/?l=linux-kernel&m=121304710726632&w=2)
- Upstream wireless updates from 2008-06-09 (http://marc.info/?l=linux- netdev&m=121304710526613&w=2)
Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
Solution
Update the affected kernel package.
Plugin Details
File Name: fedora_2008-5454.nasl
Agent: unix
Supported Sensors: Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus
Risk Information
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
Vulnerability Information
CPE: cpe:/o:fedoraproject:fedora:8, p-cpe:/a:fedoraproject:fedora:kernel
Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list
Exploit Ease: No known exploits are available
Patch Publication Date: 6/20/2008