Debian DSA-2012-1 : linux-2.6 - privilege escalation/denial of service

high Nessus Plugin ID 45054

Language:

Synopsis

The remote Debian host is missing a security-related update.

Description

Two vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or privilege escalation. The Common Vulnerabilities and Exposures project identifies the following problems :

- CVE-2009-3725 Philipp Reisner reported an issue in the connector subsystem which allows unprivileged users to send netlink packets. This allows local users to manipulate settings for uvesafb devices which are normally reserved for privileged users.

- CVE-2010-0622 Jerome Marchand reported an issue in the futex subsystem that allows a local user to force an invalid futex state which results in a denial of service (oops).

This update also includes fixes for regressions introduced by previous updates. See the referenced Debian bug pages for details.

Solution

Upgrade the linux-2.6 and user-mode-linux packages.

For the stable distribution (lenny), this problem has been fixed in version 2.6.26-21lenny4.

The following matrix lists additional source packages that were rebuilt for compatibility with or to take advantage of this update :

Debian 5.0 (lenny) user-mode-linux 2.6.26-1um-2+21lenny4

See Also

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=568561

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=570554

https://security-tracker.debian.org/tracker/CVE-2009-3725

https://security-tracker.debian.org/tracker/CVE-2010-0622

https://www.debian.org/security/2010/dsa-2012

Plugin Details

Severity: High

ID: 45054

File Name: debian_DSA-2012.nasl

Version: 1.12

Type: local

Agent: unix

Published: 3/15/2010

Updated: 1/4/2021

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 7.2

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:linux-2.6, cpe:/o:debian:debian_linux:5.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Patch Publication Date: 3/11/2010

Reference Information

CVE: CVE-2009-3725, CVE-2010-0622

CWE: 264

DSA: 2012