![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.50385 |
Category: | Fedora Local Security Checks |
Title: | Fedora Core 2 FEDORA-2004-205 (kernel) |
Summary: | NOSUMMARY |
Description: | Description: The remote host is missing an update to kernel announced via advisory FEDORA-2004-205. The kernel package contains the Linux kernel (vmlinuz), the core of any Linux operating system. The kernel handles the basic functions of the operating system: memory allocation, process allocation, device input and output, etc. Update Information: During an audit of the Linux kernel, SUSE discovered a flaw in the Linux kernel that inappropriately allows an unprivileged user to change the group ID of a file to his/her own group ID. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CVE-2004-0497 to this issue. All Fedora Core 2 users are advised to upgrade their kernels to the packages associated with their machine architectures and configurations as listed in this erratum. This update can be downloaded from: http://download.fedora.redhat.com/pub/fedora/linux/core/updates/2/ 589a54fd2cced8d92a56ae20ed45c4d0 x86_64/kernel-2.6.6-1.435.2.3.x86_64.rpm 892d973313300866b055f2bd34555036 x86_64/kernel-smp-2.6.6-1.435.2.3.x86_64.rpm 14a7b5561856a412d264350590f6d442 x86_64/kernel-debuginfo-2.6.6-1.435.2.3.x86_64.rpm 25571b4f821532794d0370e10b33fade noarch/kernel-sourcecode-2.6.6-1.435.2.3.noarch.rpm 899f693bad1197005b8294825141a2f7 noarch/kernel-doc-2.6.6-1.435.2.3.noarch.rpm 1781389f2359206f59ef5410ccecd278 ppc/kernel-2.6.6-1.435.2.3.ppc.rpm 71a19f0e0ab1c3c8d8a4342c4ea0bd5e ppc/kernel-debuginfo-2.6.6-1.435.2.3.ppc.rpm e3d8299729b73d85e6c538248d04719c SRPMS/kernel-2.6.6-1.435.2.3.src.rpm fa099f202ec122e59c585a13516ee5dd i586/kernel-2.6.6-1.435.2.3.i586.rpm 7a6f7e7a4240f69aaef161f9965c50a1 i586/kernel-smp-2.6.6-1.435.2.3.i586.rpm 1d87ad4cbf5718a60205a1cc3917e8f2 i586/kernel-debuginfo-2.6.6-1.435.2.3.i586.rpm 8a5eb4d627036d2fa1b012a2277faa3e i686/kernel-2.6.6-1.435.2.3.i686.rpm 5de1c6ae7c1dbc28e259d0ef0ce98993 i686/kernel-smp-2.6.6-1.435.2.3.i686.rpm d5afac6cc9ca2b644a56b070731dd405 i686/kernel-debuginfo-2.6.6-1.435.2.3.i686.rpm This update can also be installed with the Update Agent you can launch the Update Agent with the 'up2date' command. Solution: Apply the appropriate updates. http://www.fedoranews.org/updates/FEDORA-2004-205.shtml Risk factor : Medium CVSS Score: 2.1 |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2004-0497 Conectiva Linux advisory: CLA-2004:852 http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000852 http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:066 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9867 http://www.redhat.com/support/errata/RHSA-2004-354.html http://www.redhat.com/support/errata/RHSA-2004-360.html SuSE Security Announcement: SUSE-SA:2004:020 (Google Search) http://www.novell.com/linux/security/advisories/2004_20_kernel.html XForce ISS Database: linux-fchown-groupid-modify(16599) https://exchange.xforce.ibmcloud.com/vulnerabilities/16599 |
Copyright | Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |