Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Check for the version of the kernel packages
Detailed Explanation for this Vulnerability Assessment
This kernel update is available for Red Hat Linux Advanced Server 2.1.
It includes a fix for an information security bug, various kernel bug
fixes, and updated device drivers.
[2002-07-29] This release is a rebuild for adding exported symbols for
This kernel fixes an information security bug. When running enterprise
kernels previous to version 2.4.9-e.8, information in the Intel SSE XMM
registers could "leak" between processes under certain circumstances.
This update also includes fixes for the following bugs:
- Creation of an Oracle SGA greater than 8 GB on 16 GB or greater machine
when using bigpages and shmfs
- Sendmail running out of flocks
- Unreliable rebooting with the "reboot=bios" boot option
- Potential memory corruption on systems with more than 4 GB
- An AIO write deadlock
- IOAPIC warnings on one platform
- Potentially miscompiled code in xor.h (though kernel engineering
research does not indicate that our compiler miscompiles this code)
This kernel also has extra exported symbols removed.
This new kernel also includes several updated device drivers. The
aic7xxx_mod driver has been updated to a new version, fixing several
bugs, the tg3 driver has also been updated to a new version to fix various
bugs, and the qla2300 driver has some small bug fixes and has been updated
to work with the QLogic 2340 HBA and PowerVault 660F arrays. Additions to
the SCSI LUNs "white list" have also been made to support more fibre
[2002-07-29] This new kernel is a rebuild for adding exported symbols for
Solution : http://rhn.redhat.com/errata/RHSA-2002-128.html
Network Security Threat Level: High
Networks Security ID:
Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security
|ASUS P4V8X-MX , Socket 478 , Intel Motherboard w/ 2.8GHZ CPU
|OEM Intel Core i3-2370M 2.4GHz Socket G2 (rPGA988B) Laptop Processor CPU SR0DP
|Intel Core 2 Quad Q9450 2.66GHz Quad-Core CPU Desktop Processor SLAWR
|Thermaltake Slim X3 CPU Cooler Store Stock Never Used
No Discussions have been posted on this vulnerability.