|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> Red Hat Local Security Checks >> RHSA-2003-195: kernel Vulnerability Assessment Details
|
RHSA-2003-195: kernel |
||
Check for the version of the kernel packages Detailed Explanation for this Vulnerability Assessment Updated kernel packages for Red Hat Enterprise Linux are now available which address several security vulnerabilities. The Linux kernel handles the basic functions of the operating system. Several security issues have been found that affect the Linux kernel: Al Viro found a security issue in the tty layer whereby any user could cause a kernel oops. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2003-0247 to this issue. Andrea Arcangeli found an issue in the low-level mxcsr code in which a malformed address would leave garbage in cpu state registers. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2003-0248 to this issue. The TCP/IP fragment reassembly handling permits remote attackers to cause a denial of service (CPU consumption) via packets that cause a large number of hash table collisions, a vulnerability similar to CVE-2003-0244. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2003-0364 to this issue. These kernels also contain updated fixes for the ioperm security issue, as well as fixes for a number of bugs. It is recommended that users upgrade to these erratum kernels, which contain patches to correct these vulnerabilities. Solution : http://rhn.redhat.com/errata/RHSA-2003-195.html Network Security Threat Level: High Networks Security ID: Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security |
||
Cables, Connectors |
Dell PowerEdge FX2 FX2S Enclosure - 4x PowerEdge FC640 w/ 8x Gold 6132 112C 1TB
$2699.99
Dell PowerEdge FX2 FX2S Enclosure - 4x PowerEdge FC640 w/ 8x Gold 6134 64C 1TB
$3299.99
DELL M630 BLADE SERVER x2 XEON E5-2660V3 @ 2.6GH H730 PERC HDD CADDIES 16GB FC
$50.00
Cisco UCS 5108 Blade Server Chassis Enclosure 8x B200 M4 16x E5-2640v3 128gb
$599.99
2 x HP ProLiant BL460c (447707-B21) Blade Servers No RAM No HDD
$30.00
Dell PowerEdge FX2s CTO Blade 4 Slot 2U Chassis 2x 2000W
$399.00
Dell PowerEdge C6400 Blade Server Chassis w/ 2x 2400W PSUs - Preproduction Model
$399.00
HP BL460c 2SFF GEN9 Blade Server 2x 12 Core Xeon E5-2670 v3 256GB RAM 600GB HDD
$229.99
Dell PowerEdge M620 Blade Server
$39.99
UCSB-B200-M4 UCS Blade Server, 2x E5-2667 V3, 256GB RAM DDR4, 2x 300GB Drives
$299.99
|
||
No Discussions have been posted on this vulnerability. |