Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Fedora Local Security Checks >> Fedora Core 1 2004-186: kernel


Vulnerability Assessment Details

Fedora Core 1 2004-186: kernel

Vulnerability Assessment Summary
Check for the version of the kernel package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory FEDORA-2004-186 (kernel).

The kernel package contains the Linux kernel (vmlinuz), the core of your
Fedora Core Linux operating system. The kernel handles the basic functions
of the operating system: memory allocation, process allocation, device
input and output, etc.

Update Information:

Numerous problems referencing userspace memory were identified in several
device drivers by Al Viro using the sparse tool. The Common Vulnerabilities
and Exposures project (cve.mitre.org) assigned the name CVE-2004-0495 to this issue.

A problem was found where userspace code could execute certain floating
point instructions from signal handlers which would cause the kernel
to lock up. The Common Vulnerabilities and Exposures project (cve.mitre.org)
assigned the name CVE-2004-0554 to this issue.

Previous kernels contained a patch against the framebuffer ioctl
code which turned out to be unnecessary. This has been dropped
in this update.

A memory leak in the E1000 network card driver has been fixed.
The Common Vulnerabilities and Exposures project (cve.mitre.org) assigned
the name CVE-2004-0535 to this issue.

Previously, inappropriate permissions were set on /proc/scsi/qla2300/HbaApiNode
The Common Vulnerabilities and Exposures project (cve.mitre.org) assigned
the name CVE-2004-0587 to this issue.

Support for systems with more than 4GB of memory was previously unavailable.
The 686 SMP kernel now supports this configuration. (Bugzilla #122960)
Support for SMP on 586's was also previously not included.
This has also been rectified. (Bugzilla #111871)



Solution : http://www.fedoranews.org/updates/FEDORA-2004-186.shtml
Network Security Threat Level: High

Networks Security ID: 10279, 10352

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security

Cables, Connectors

Dell PowerEdge M620 Blade 2x E5-2660 2.20Ghz 8 Core 384GB RAM 2x Trays H710 RAID
$1850.0
Dell PowerEdge M620 Blade 2x E5-2660 2.20Ghz 8 Core 384GB RAM 2x Trays H710 RAID pictureHP Renew ML350 G9 Tower Single E5-2630 v4 10-Core 2.2GHz 128GB 2x 480GB SSD
$4576.0
HP Renew ML350 G9 Tower Single E5-2630 v4 10-Core 2.2GHz 128GB 2x 480GB SSD pictureHP DL380 DL380p G8 Server Intel Xeon 16 Core 2.9GHz 128GB RAM 8x 600GB 15K Rails
$2899.0
HP DL380 DL380p G8 Server Intel Xeon 16 Core 2.9GHz 128GB RAM 8x 600GB 15K Rails pictureHP ProLiant DL380p G8 Server Dual Xeon E5-2620 6C 2.0GHz 384GB 8x 600GB 15K SAS
$4916.0
HP ProLiant DL380p G8 Server Dual Xeon E5-2620 6C 2.0GHz 384GB 8x 600GB 15K SAS picture


Discussions

No Discussions have been posted on this vulnerability.