Vulnerability Assessment & Network Security Forums

If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.

Home >> Browse Vulnerability Assessment Database >> Fedora Local Security Checks >> Fedora Core 4 2005-820: kernel

Vulnerability Assessment Details

Fedora Core 4 2005-820: kernel

Vulnerability Assessment Summary
Check for the version of the kernel package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory FEDORA-2005-820 (kernel).

The kernel package contains the Linux kernel (vmlinuz), the core of
the Red Hat Linux operating system. The kernel handles the basic
functions of the operating system: memory allocation, process
allocation, device input and output, etc.

* Fri Aug 26 2005 Dave Jones [2.6.12-1.1447_FC4]
- Better identify local builds. (#159696)
- Fix disk/net dump & netconsole. (#152586)
- Fix up sleeping in invalid context in sym2 driver. (#164995)
- Fix 'semaphore is not ready' error in snd-intel8x0m.
- Restore hwclock functionality on some systems. (#144894)
- Merge patches proposed for
- Fix typo in ALPS driver.
- Fix 'No sense' error with Transcend USB key. (#162559)
- Fix up ide-scsi check for medium not present. (#160868)
- powernow-k8 driver update from 2.6.13rc7.

* Tue Aug 23 2005 Dave Jones [2.6.12-1.1435_FC4]
- Work around AMD x86-64 errata 122.

* Tue Aug 23 2005 Rik van Riel
- upgrade to today's Xen snapshot

* Mon Aug 22 2005 Rik van Riel
- make sure that the vsyscall-note is linked in so the right glibc is used

* Sun Aug 21 2005 Rik van Riel
- fix the Xen vsyscall problem

* Thu Aug 18 2005 David Woodhouse
- Don't probe 8250 ports on ppc32 unless they're in the device tree
- Enable ISDN, 8250 console, i8042 keyboard controller on ppc32
- Audit updates from git tree

* Wed Aug 17 2005 Rik van Riel
- temporarily disable the vsyscall page for Xen

* Tue Aug 16 2005 Dave Jones
- Restrict ipsec socket policy loading to CAP_NET_ADMIN. (CVE-2005-2555)

* Mon Aug 15 2005 Rik van Riel
- upgrade Xen to a newer version

* Mon Aug 15 2005 Dave Jones
- Fix module_verify_elf check that rejected valid .ko files. (#165528)

* Thu Aug 11 2005 Dave Jones
- Audit speedup in syscall path.
- Update to a newer ACPI drop.

* Fri Aug 5 2005 Dave Jones [2.6.12-1.1420_FC4]
- update to final patchset.
- ACPI update to 20050729.
- Disable experimental ACPI HOTKEY driver. (#163355)

* Thu Aug 4 2005 Dave Jones
- Enable Amiga partition support. (#149802)

* Wed Aug 3 2005 Dave Jones [2.6.12-1.1411_FC4]
- Include pre-release patchset
- Silence some messages from PowerMac thermal driver. (#158739)
- nfs server intermitently claimed ENOENT on existing files or directories. (#1
- Stop usbhid driver incorrectly claiming Wireless Security Lock as a mouse. (#
- Further NFSD fixing for non-standard ports.
- Fix up miscalculated i_nlink in /proc (#162418)
- Fix addrlen checks in selinux_socket_connect. (#164165)

* Thu Jul 28 2005 Dave Jones
- Fix compilation with older gcc. (#164041)

Solution : Get the newest Fedora Updates
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Tenable Network Security

Cables, Connectors

HP Pavilion x360 15-bk020wm 15.6" Genuine CPU Cooling Fan w/ Heatsink 862523-001
HP Pavilion x360 15-bk020wm 15.6Asus N55SL Genuine Laptop CPU Fan 13GN5F1AM020-1 & Heatsink 36NJ5TMJN10
Asus N55SL Genuine Laptop CPU Fan 13GN5F1AM020-1 & Heatsink 36NJ5TMJN10 pictureCPU INTEL PENTIUM II SL265 266MHz SLOT1 + COOLER
CPU INTEL PENTIUM II SL265 266MHz SLOT1 + COOLER pictureHydraulic CPU Cooler Heatpipe Fans Quiet Heatsink Radiator for Intel Core C1G8
Hydraulic CPU Cooler Heatpipe Fans Quiet Heatsink Radiator for Intel Core C1G8 picture


No Discussions have been posted on this vulnerability.