Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Slackware Local Security Checks >> SSA-2003-336-01 Kernel security update


Vulnerability Assessment Details

SSA-2003-336-01 Kernel security update

Vulnerability Assessment Summary
SSA-2003-336-01 Kernel security update

Detailed Explanation for this Vulnerability Assessment

New kernels are available for Slackware 9.1 and -current. These
have been upgraded to Linux kernel version 2.4.23, which fixes a
bug in the kernel's do_brk() function that could be exploited to
gain root rights. These updated kernels and modules should be
installed by any sites running a 2.4 kernel earlier than 2.4.23.
Linux 2.0 and 2.2 kernels are not vulnerable.

More details about the Apache issue may be found in the Common
Vulnerabilities and Exposures (CVE) database:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0961




Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Michel Arboi

Cables, Connectors

Intel Core i7-950 3.06GHz Quad-Core Processor CPU
$20.0
Intel Core i7-950 3.06GHz Quad-Core Processor CPU pictureIntel Core 2 Duo T7200 Laptop CPU Mobile Processor 2.00 GHz 4M SL9SF Socket M
$8.99
Intel Core 2 Duo T7200 Laptop CPU Mobile Processor 2.00 GHz 4M SL9SF Socket M pictureHP Z620 One CPU Intel 8-core E5-2650 2.0Ghz 64GB 1TB SATA Workstation Tower PC
$399.0
HP Z620 One CPU Intel 8-core E5-2650 2.0Ghz 64GB 1TB SATA Workstation Tower PC pictureINTEL XEON 10 CORE PROCESSOR E7-4830V2 2.2GHZ 20MB CACHE 7.2 GT/S QPI CPU SR1GU
$1795.0
INTEL XEON 10 CORE PROCESSOR E7-4830V2 2.2GHZ 20MB CACHE 7.2 GT/S QPI CPU SR1GU picture


Discussions

No Discussions have been posted on this vulnerability.