Debian DSA-1289-1 : linux-2.6 - several vulnerabilities

Medium Nessus Plugin ID 25226

Synopsis

The remote Debian host is missing a security-related update.

Description

Several local and remote vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or the execution of arbitrary code. The Common Vulnerabilities and Exposures project identifies the following problems :

- CVE-2007-1496 Michal Miroslaw reported a DoS vulnerability (crash) in netfilter. A remote attacker can cause a NULL pointer dereference in the nfnetlink_log function.

- CVE-2007-1497 Patrick McHardy reported an vulnerability in netfilter that may allow attackers to bypass certain firewall rules. The nfctinfo value of reassembled IPv6 packet fragments were incorrectly initialized to 0 which allowed these packets to become tracked as ESTABLISHED.

- CVE-2007-1861 Jaco Kroon reported a bug in which NETLINK_FIB_LOOKUP packages were incorrectly routed back to the kernel resulting in an infinite recursion condition. Local users can exploit this behavior to cause a DoS (crash).

Solution

Upgrade the kernel package immediately and reboot the machine. If you have built a custom kernel from the kernel source package, you will need to rebuild to take advantage of these fixes.

For the stable distribution (etch) these problems have been fixed in version 2.6.18.dfsg.1-12etch2.

The following matrix lists additional packages that were rebuilt for compatibility with or to take advantage of this update :

Debian 4.0 (etch) fai-kernels 1.17+etch2 user-mode-linux 2.6.18-1um-2etch2 kernel-patch-openvz 028.18.1etch1

See Also

https://security-tracker.debian.org/tracker/CVE-2007-1496

https://security-tracker.debian.org/tracker/CVE-2007-1497

https://security-tracker.debian.org/tracker/CVE-2007-1861

https://www.debian.org/security/2007/dsa-1289

Plugin Details

Severity: Medium

ID: 25226

File Name: debian_DSA-1289.nasl

Version: 1.15

Type: local

Agent: unix

Published: 2007/05/16

Updated: 2018/11/10

Dependencies: 12634

Risk Information

Risk Factor: Medium

CVSS v2.0

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:linux-2.6, cpe:/o:debian:debian_linux:4.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Patch Publication Date: 2007/05/13

Reference Information

CVE: CVE-2007-1496, CVE-2007-1497, CVE-2007-1861

DSA: 1289

CWE: 399