Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Check for the version of the kernel packages
Detailed Explanation for this Vulnerability Assessment
This kernel update is available for Red Hat Linux Advanced Server 2.1.
It includes a fix for an information security bug, various kernel bug
fixes, and updated device drivers.
[2002-07-29] This release is a rebuild for adding exported symbols for
This kernel fixes an information security bug. When running enterprise
kernels previous to version 2.4.9-e.8, information in the Intel SSE XMM
registers could "leak" between processes under certain circumstances.
This update also includes fixes for the following bugs:
- Creation of an Oracle SGA greater than 8 GB on 16 GB or greater machine
when using bigpages and shmfs
- Sendmail running out of flocks
- Unreliable rebooting with the "reboot=bios" boot option
- Potential memory corruption on systems with more than 4 GB
- An AIO write deadlock
- IOAPIC warnings on one platform
- Potentially miscompiled code in xor.h (though kernel engineering
research does not indicate that our compiler miscompiles this code)
This kernel also has extra exported symbols removed.
This new kernel also includes several updated device drivers. The
aic7xxx_mod driver has been updated to a new version, fixing several
bugs, the tg3 driver has also been updated to a new version to fix various
bugs, and the qla2300 driver has some small bug fixes and has been updated
to work with the QLogic 2340 HBA and PowerVault 660F arrays. Additions to
the SCSI LUNs "white list" have also been made to support more fibre
[2002-07-29] This new kernel is a rebuild for adding exported symbols for
Solution : http://rhn.redhat.com/errata/RHSA-2002-128.html
Network Security Threat Level: High
Networks Security ID:
Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security
|G.SKILL Trident Z F4-3200C14D-16GTZSK 2x8GB DDR4 3200 MHz RAM CL14-14-14-34
|G.SKILL Ripjaws V Series 32GB (4 x 8GB) 288-Pin DDR4 SDRAM DDR4 3000 (PC4 24000)
|LENOVO THINKPAD X60 C2D 1.66GHz 4GB RAM 120GB SSD WINDOWS 10 PRO WIFI
|(Lot of 4) Crucial CT16G3ERSDD4186D.36FED 16GB 64gb DDR3-1866 Server RAM
No Discussions have been posted on this vulnerability.