Debian DSA-1681-1 : linux-2.6.24 - denial of service/privilege escalation

critical Nessus Plugin ID 35036

Synopsis

The remote Debian host is missing a security-related update.

Description

Several vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or privilege escalation. The Common Vulnerabilities and Exposures project identifies the following problems :

- CVE-2008-3528 Eugene Teo reported a local DoS issue in the ext2 and ext3 filesystems. Local users who have been granted the privileges necessary to mount a filesystem would be able to craft a corrupted filesystem that causes the kernel to output error messages in an infinite loop.

- CVE-2008-4554 Milos Szeredi reported that the usage of splice() on files opened with O_APPEND allows users to write to the file at arbitrary offsets, enabling a bypass of possible assumed semantics of the O_APPEND flag.

- CVE-2008-4576 Vlad Yasevich reported an issue in the SCTP subsystem that may allow remote users to cause a local DoS by triggering a kernel oops.

- CVE-2008-4618 Wei Yongjun reported an issue in the SCTP subsystem that may allow remote users to cause a local DoS by triggering a kernel panic.

- CVE-2008-4933 Eric Sesterhenn reported a local DoS issue in the hfsplus filesystem. Local users who have been granted the privileges necessary to mount a filesystem would be able to craft a corrupted filesystem that causes the kernel to overrun a buffer, resulting in a system oops or memory corruption.

- CVE-2008-4934 Eric Sesterhenn reported a local DoS issue in the hfsplus filesystem. Local users who have been granted the privileges necessary to mount a filesystem would be able to craft a corrupted filesystem that results in a kernel oops due to an unchecked return value.

- CVE-2008-5025 Eric Sesterhenn reported a local DoS issue in the hfs filesystem. Local users who have been granted the privileges necessary to mount a filesystem would be able to craft a filesystem with a corrupted catalog name length, resulting in a system oops or memory corruption.

- CVE-2008-5029 Andrea Bittau reported a DoS issue in the unix socket subsystem that allows a local user to cause memory corruption, resulting in a kernel panic.

- CVE-2008-5134 Johannes Berg reported a remote DoS issue in the libertas wireless driver, which can be triggered by a specially crafted beacon/probe response.

- CVE-2008-5182 Al Viro reported race conditions in the inotify subsystem that may allow local users to acquire elevated privileges.

- CVE-2008-5300 Dann Frazier reported a DoS condition that allows local users to cause the out of memory handler to kill off privileged processes or trigger soft lockups due to a starvation issue in the unix socket subsystem.

Solution

Upgrade the linux-2.6.24 packages.

For the stable distribution (etch), these problems have been fixed in version 2.6.24-6~etchnhalf.7.

See Also

https://security-tracker.debian.org/tracker/CVE-2008-3528

https://security-tracker.debian.org/tracker/CVE-2008-4554

https://security-tracker.debian.org/tracker/CVE-2008-4576

https://security-tracker.debian.org/tracker/CVE-2008-4618

https://security-tracker.debian.org/tracker/CVE-2008-4933

https://security-tracker.debian.org/tracker/CVE-2008-4934

https://security-tracker.debian.org/tracker/CVE-2008-5025

https://security-tracker.debian.org/tracker/CVE-2008-5029

https://security-tracker.debian.org/tracker/CVE-2008-5134

https://security-tracker.debian.org/tracker/CVE-2008-5182

https://security-tracker.debian.org/tracker/CVE-2008-5300

https://www.debian.org/security/2008/dsa-1681

Plugin Details

Severity: Critical

ID: 35036

File Name: debian_DSA-1681.nasl

Version: 1.16

Type: local

Agent: unix

Published: 12/5/2008

Updated: 1/4/2021

Supported Sensors: Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 8.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:linux-2.6.24, cpe:/o:debian:debian_linux:4.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Ease: No known exploits are available

Patch Publication Date: 12/4/2008

Vulnerability Publication Date: 9/27/2008

Reference Information

CVE: CVE-2008-3528, CVE-2008-4554, CVE-2008-4576, CVE-2008-4618, CVE-2008-4933, CVE-2008-4934, CVE-2008-5025, CVE-2008-5029, CVE-2008-5134, CVE-2008-5182, CVE-2008-5300

BID: 31634, 31903, 32093, 32154, 32289

CWE: 119, 20, 264, 287, 362, 399

DSA: 1681