Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Check for the version of the kernel package
Detailed Explanation for this Vulnerability Assessment
The remote host is missing the patch for the advisory FEDORA-2005-820 (kernel).
The kernel package contains the Linux kernel (vmlinuz), the core of
the Red Hat Linux operating system. The kernel handles the basic
functions of the operating system: memory allocation, process
allocation, device input and output, etc.
* Fri Aug 26 2005 Dave Jones
- Better identify local builds. (#159696)
- Fix disk/net dump & netconsole. (#152586)
- Fix up sleeping in invalid context in sym2 driver. (#164995)
- Fix 'semaphore is not ready' error in snd-intel8x0m.
- Restore hwclock functionality on some systems. (#144894)
- Merge patches proposed for 184.108.40.206
- Fix typo in ALPS driver.
- Fix 'No sense' error with Transcend USB key. (#162559)
- Fix up ide-scsi check for medium not present. (#160868)
- powernow-k8 driver update from 2.6.13rc7.
* Tue Aug 23 2005 Dave Jones
- Work around AMD x86-64 errata 122.
* Tue Aug 23 2005 Rik van Riel
- upgrade to today's Xen snapshot
* Mon Aug 22 2005 Rik van Riel
- make sure that the vsyscall-note is linked in so the right glibc is used
* Sun Aug 21 2005 Rik van Riel
- fix the Xen vsyscall problem
* Thu Aug 18 2005 David Woodhouse
- Don't probe 8250 ports on ppc32 unless they're in the device tree
- Enable ISDN, 8250 console, i8042 keyboard controller on ppc32
- Audit updates from git tree
* Wed Aug 17 2005 Rik van Riel
- temporarily disable the vsyscall page for Xen
* Tue Aug 16 2005 Dave Jones
- Restrict ipsec socket policy loading to CAP_NET_ADMIN. (CVE-2005-2555)
* Mon Aug 15 2005 Rik van Riel
- upgrade Xen to a newer version
* Mon Aug 15 2005 Dave Jones
- Fix module_verify_elf check that rejected valid .ko files. (#165528)
* Thu Aug 11 2005 Dave Jones
- Audit speedup in syscall path.
- Update to a newer ACPI drop.
* Fri Aug 5 2005 Dave Jones
- update to final 220.127.116.11 patchset.
- ACPI update to 20050729.
- Disable experimental ACPI HOTKEY driver. (#163355)
* Thu Aug 4 2005 Dave Jones
- Enable Amiga partition support. (#149802)
* Wed Aug 3 2005 Dave Jones
- Include pre-release 18.104.22.168 patchset
- Silence some messages from PowerMac thermal driver. (#158739)
- nfs server intermitently claimed ENOENT on existing files or directories. (#1
- Stop usbhid driver incorrectly claiming Wireless Security Lock as a mouse. (#
- Further NFSD fixing for non-standard ports.
- Fix up miscalculated i_nlink in /proc (#162418)
- Fix addrlen checks in selinux_socket_connect. (#164165)
* Thu Jul 28 2005 Dave Jones
- Fix compilation with older gcc. (#164041)
Solution : Get the newest Fedora Updates
Network Security Threat Level: High
Networks Security ID:
Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Tenable Network Security
|Cisco Catalyst WS-C3850-24XS-S network switch Managed Black,Grey
|Cisco Catalyst WS-C3650-48PD-S network switch Managed L3 Gigabit Ethernet
|Cisco Catalyst WS-C3650-48TS-E network switch Managed L3 Gigabit Ethernet
|Cisco Catalyst WS-C3650-48PS-S network switch Managed L3 Gigabit Ethernet
No Discussions have been posted on this vulnerability.