Ubuntu 6.06 LTS / 7.10 / 8.04 LTS : linux-source-2.6.15/22, linux vulnerabilities (USN-714-1)

Ubuntu Security Notice (C) 2009-2016 Canonical, Inc. / NASL script (C) 2009-2016 Tenable Network Security, Inc.


Synopsis :

The remote Ubuntu host is missing one or more security-related
patches.

Description :

Hugo Dias discovered that the ATM subsystem did not correctly manage
socket counts. A local attacker could exploit this to cause a system
hang, leading to a denial of service. (CVE-2008-5079)

It was discovered that the libertas wireless driver did not correctly
handle beacon and probe responses. A physically near-by attacker could
generate specially crafted wireless network traffic and cause a denial
of service. Ubuntu 6.06 was not affected. (CVE-2008-5134)

It was discovered that the inotify subsystem contained watch removal
race conditions. A local attacker could exploit this to crash the
system, leading to a denial of service. (CVE-2008-5182)

Dann Frazier discovered that in certain situations sendmsg did not
correctly release allocated memory. A local attacker could exploit
this to force the system to run out of free memory, leading to a
denial of service. Ubuntu 6.06 was not affected. (CVE-2008-5300)

It was discovered that the ATA subsystem did not correctly set
timeouts. A local attacker could exploit this to cause a system hang,
leading to a denial of service. (CVE-2008-5700)

It was discovered that the ib700 watchdog timer did not correctly
check buffer sizes. A local attacker could send a specially crafted
ioctl to the device to cause a system crash, leading to a denial of
service. (CVE-2008-5702)

It was discovered that in certain situations the network scheduler did
not correctly handle very large levels of traffic. A local attacker
could produce a high volume of UDP traffic resulting in a system hang,
leading to a denial of service. Ubuntu 8.04 was not affected.
(CVE-2008-5713).

Note that Tenable Network Security has extracted the preceding
description block directly from the Ubuntu security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.

Solution :

Update the affected packages.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 7.8
(CVSS2#E:POC/RL:OF/RC:C)
Public Exploit Available : true

Family: Ubuntu Local Security Checks

Nessus Plugin ID: 36454 ()

Bugtraq ID: 32676

CVE ID: CVE-2008-5079
CVE-2008-5134
CVE-2008-5182
CVE-2008-5300
CVE-2008-5700
CVE-2008-5702
CVE-2008-5713