Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Fedora Local Security Checks >> Fedora Core 4 2006-573: kernel


Vulnerability Assessment Details

Fedora Core 4 2006-573: kernel

Vulnerability Assessment Summary
Check for the version of the kernel package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory FEDORA-2006-573 (kernel).

The kernel package contains the Linux kernel (vmlinuz), the core of any
Linux operating system. The kernel handles the basic functions
of the operating system: memory allocation, process allocation, device
input and output, etc.

Update Information:

This update rebases to the latest upstream -stable release
(2.6.16.17), where a number of security problems have been
fixed, notably:

SCTP: Validate the parameter length in HB-ACK chunk
(CVE-2006-1857)
SCTP: Respect the real chunk length when walking parameters
(CVE-2006-1858)
fs/locks.c: Fix lease_init (CVE-2006-1860)
SCTP: Fix state table entries for chunks received in CLOSED
state. (CVE-2006-2271)
SCTP: Fix panic's when receiving fragmented SCTP control
chunks. (CVE-2006-2272)
SCTP: Prevent possible infinite recursion with multiple
bundled DATA. (CVE-2006-2274)
SCTP: Allow spillover of receive buffer to avoid deadlock.
(CVE-2006-2275)


Complete changelogs for the -stable releases can be found at

[8]http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.17
[9]http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.16
[10]http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.16.15

Fedora specific changes are detailed below


Solution : Get the newest Fedora Updates
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2007 Tenable Network Security

Cables, Connectors

ASIS Juniper EX3200-48P 48-port 10/100/1000BASE-T 4-port GbE SFP optics AC Power
$225.0
ASIS Juniper EX3200-48P 48-port 10/100/1000BASE-T 4-port GbE SFP optics AC Power pictureJuniper Networks Secure Services Gateway SSG 20 SSG-20-SH
$9.99
Juniper Networks Secure Services Gateway SSG 20 SSG-20-SH pictureJuniper EX3300-48P 48-port 1GbE BaseT PoE w/ 4x Fixed SFP+ 1/10G Uplink Switch
$900.0
Juniper EX3300-48P 48-port 1GbE BaseT PoE w/ 4x  Fixed SFP+ 1/10G Uplink Switch pictureJuniper WLA532-US 802.11a/b/g/n Indoor Wireless LAN Access Point 450Mbps
$24.5
Juniper WLA532-US 802.11a/b/g/n Indoor Wireless LAN Access Point 450Mbps  picture


Discussions

No Discussions have been posted on this vulnerability.