SynopsisThe remote Fedora host is missing a security update.
DescriptionUpdate to kernel 188.8.131.52:
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-184.108.40.206 http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-220.127.116.11 CVE-2008-1673: The asn1 implementation in (a) the Linux kernel 2.4 before 18.104.22.168 and 2.6 before 22.214.171.124, as used in the cifs and ip_nat_snmp_basic modules; and (b) the gxsnmp package; does not properly validate length values during decoding of ASN.1 BER data, which allows remote attackers to cause a denial of service (crash) or execute arbitrary code via (1) a length greater than the working buffer, which can lead to an unspecified overflow; (2) an oid length of zero, which can lead to an off-by-one error; or (3) an indefinite length for a primitive encoding. Bugs fixed: 224005 - pata_pcmcia fails 326411 - Freeze On Boot w/ Audigy PCMCIA 450332 - F8 - System Lockup after kernel 126.96.36.199-10 450499 - kernel-188.8.131.52-10.fc8 breaks setkey -m tunnel options in ipsec 450501
- User Mode Linux (UML) broken on Fedora 9 (and now F8, too) Additional bugs fixed: F9#447518 - Call to capget() overflows buffers F9#450191 - DMA mode disabled for DVD drive, reverts to PIO4 F9#439197 - thinkpad x61t crash when undocking F9#447812 - Netlink messages from 'tc' to sch_netem module are not interpreted correctly F9#449817
- SD card reader causes kernel panic during startup if card inserted Additional updates/fixes: - Fix oops in lirc_i2c module - Add lirc support for additional MCE receivers - Upstream wireless updates from 2008-05-22 (http://marc.info/?l=linux- wireless&m=121146112404515&w=2) - Upstream wireless fixes from 2008-05-28 (http://marc.info/?l=linux-wireless&m=121201250110162&w= 2) - Upstream wireless fixes from 2008-06-03 (http://marc.info/?l=linux- wireless&m=121252137324941&w=2) - Upstream wireless fixes from 2008-06-09 (http://marc.info/?l=linux-kernel&m=121304710726632&w=2)
- Upstream wireless updates from 2008-06-09 (http://marc.info/?l=linux- netdev&m=121304710526613&w=2)
Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
SolutionUpdate the affected kernel package.
File Name: fedora_2008-5454.nasl
Supported Sensors: Frictionless Assessment Agent, Nessus Agent
Temporal Vector: E:ND/RL:OF/RC:C
CPE: p-cpe:/a:fedoraproject:fedora:kernel, cpe:/o:fedoraproject:fedora:8
Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list
Exploit Ease: No known exploits are available
Patch Publication Date: 6/20/2008