Description: | Description:
The remote host is missing an update to kernel announced via advisory FEDORA-2008-3949.
The kernel package contains the Linux kernel (vmlinuz), the core of any Linux operating system. The kernel handles the basic functions of the operating system: memory allocation, process allocation, device input and output, etc.
Update Information:
Update to Linux kernel verion 2.6.25.1, 2.6.25.2, 2.6.25.3: http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25.1 http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25.2 http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.25.3
Security fixes: CVE-2008-1669 (2.6.25.2) - SMP ordering hole in fcntl_setlk() CVE-2008-2136 (2.6.25.3) - SIT exploitable remote memory leak CVE-2008-1375, CVE-2008-1675 were fixed in 2.6.25-12.fc9 and are available in GA version of kernel package shipped in Fedora 9.
ChangeLog:
* Mon May 12 2008 Chuck Ebbert 2.6.25.3-18 - CIFS: fix UNC path prefix to have the correct slash (#443681) * Mon May 12 2008 Chuck Ebbert 2.6.25.3-17 - Linux 2.6.25.3
References:
[ 1 ] Bug #443433 - CVE-2008-1669 kernel: add rcu_read_lock() to fcheck() in both dnotify, locks.c and fix fcntl store/load race in locks.c https://bugzilla.redhat.com/show_bug.cgi?id=443433 [ 2 ] Bug #446031 - CVE-2008-2136 kernel: sit: exploitable remote memory leak https://bugzilla.redhat.com/show_bug.cgi?id=446031
Solution: Apply the appropriate updates.
This update can be installed with the yum update program. Use su -c 'yum update kernel' at the command line. For more information, refer to Managing Software with yum, available at http://docs.fedoraproject.org/yum/.
http://www.securityspace.com/smysecure/catid.html?in=FEDORA-2008-3949
Risk factor : High
CVSS Score: 7.8
|