Fedora 9 : kernel-2.6.26.6-79.fc9 (2008-8929)

This script is Copyright (C) 2008-2016 Tenable Network Security, Inc.


Synopsis :

The remote Fedora host is missing a security update.

Description :

Update kernel from version 2.6.26.5 to 2.6.26.6:
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.26.6
CVE-2008-3831 An IOCTL in the i915 driver was not properly restricted
to users with the proper capabilities to use it. CVE-2008-4410 The
vmi_write_ldt_entry function in arch/x86/kernel/vmi_32.c in the
Virtual Machine Interface (VMI) in the Linux kernel 2.6.26.5 invokes
write_idt_entry where write_ldt_entry was intended, which allows local
users to cause a denial of service (persistent application failure)
via crafted function calls, related to the Java Runtime Environment
(JRE) experiencing improper LDT selector state, a different
vulnerability than CVE-2008-3247. CVE-2008-3525 The sbni_ioctl
function in drivers/net/wan/sbni.c in the wan subsystem in the Linux
kernel 2.6.26.3 does not check for the CAP_NET_ADMIN capability before
processing a (1) SIOCDEVRESINSTATS, (2) SIOCDEVSHWSTATE, (3)
SIOCDEVENSLAVE, or (4) SIOCDEVEMANSIPATE ioctl request, which allows
local users to bypass intended capability restrictions. CVE-2008-4554
The do_splice_from function in fs/splice.c in the Linux kernel before
2.6.27 does not reject file descriptors that have the O_APPEND flag
set, which allows local users to bypass append mode and make arbitrary
changes to other locations in the file. CVE-2008-4576 sctp in Linux
kernel before 2.6.25.18 allows remote attackers to cause a denial of
service (OOPS) via an INIT-ACK that states the peer does not support
AUTH, which causes the sctp_process_init function to clean up active
transports and triggers the OOPS when the T1-Init timer expires.

Note that Tenable Network Security has extracted the preceding
description block directly from the Fedora security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.

See also :

http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.26.6
https://bugzilla.redhat.com/show_bug.cgi?id=438606
https://bugzilla.redhat.com/show_bug.cgi?id=460550
https://bugzilla.redhat.com/show_bug.cgi?id=462156
https://bugzilla.redhat.com/show_bug.cgi?id=462178
https://bugzilla.redhat.com/show_bug.cgi?id=462919
https://bugzilla.redhat.com/show_bug.cgi?id=463034
https://bugzilla.redhat.com/show_bug.cgi?id=464613
https://bugzilla.redhat.com/show_bug.cgi?id=465873
https://bugzilla.redhat.com/show_bug.cgi?id=466303
https://bugzilla.redhat.com/show_bug.cgi?id=466511
http://www.nessus.org/u?5c2a6ea6

Solution :

Update the affected kernel package.

Risk factor :

High / CVSS Base Score : 7.8
(CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C)
CVSS Temporal Score : 6.8
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : false

Family: Fedora Local Security Checks

Nessus Plugin ID: 34480 (fedora_2008-8929.nasl)

Bugtraq ID: 31565
31634
31792

CVE ID: CVE-2008-3525
CVE-2008-3831
CVE-2008-4410
CVE-2008-4554
CVE-2008-4576

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now