Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:
Category:Red Hat Local Security Checks
Title:RedHat Security Advisory RHSA-2004:255

The remote host is missing updates announced in
advisory RHSA-2004:255.

The Linux kernel handles the basic functions of the operating system.

A flaw was found in Linux kernel versions 2.4 and 2.6 for x86 and x86_64
that allowed local users to cause a denial of service (system crash) by
triggering a signal handler with a certain sequence of fsave and frstor
instructions. The Common Vulnerabilities and Exposures project
( has assigned the name CVE-2004-0554 to this issue.

Another flaw was discovered in an error path supporting the clone()
system call that allowed local users to cause a denial of service
(memory leak) by passing invalid arguments to clone() running in an
infinite loop of a user's program. The Common Vulnerabilities and
Exposures project ( has assigned the name CVE-2004-0427
to this issue.

Enhancements were committed to the 2.6 kernel by Al Viro which enabled the
Sparse source code checking tool to check for a certain class of kernel
bugs. A subset of these fixes also applies to various drivers in the 2.4
kernel. Although the majority of these resides in drivers unsupported in
Red Hat Enterprise Linux 3, the flaws could lead to privilege escalation or
access to kernel memory. The Common Vulnerabilities and Exposures project
( has assigned the name CVE-2004-0495 to these issues.

All Red Hat Enterprise Linux 3 users are advised to upgrade their kernels
to the packages associated with their machine architectures and
configurations as listed in this erratum. These packages contain
backported patches to correct these issues.

Please note that this update is available via
Red Hat Network. To use Red Hat Network, launch the Red
Hat Update Agent with the following command: up2date

Risk factor : High

CVSS Score:

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2004-0427
BugTraq ID: 10221
Computer Incident Advisory Center Bulletin: O-164
Conectiva Linux advisory: CLA-2004:846
Debian Security Information: DSA-1067 (Google Search)
Debian Security Information: DSA-1069 (Google Search)
Debian Security Information: DSA-1070 (Google Search)
Debian Security Information: DSA-1082 (Google Search)
En Garde Linux Advisory: ESA-20040428-004
SGI Security Advisory: 20040504-01-U
SGI Security Advisory: 20040505-01-U
SuSE Security Announcement: SuSE-SA:2004:010 (Google Search)
TurboLinux Advisory: TLSA-2004-14
XForce ISS Database: linux-dofork-memory-leak(16002)
Common Vulnerability Exposure (CVE) ID: CVE-2004-0495
BugTraq ID: 10566
Conectiva Linux advisory: CLA-2004:845
SuSE Security Announcement: SUSE-SA:2004:020 (Google Search)
XForce ISS Database: linux-drivers-gain-privileges(16449)
Common Vulnerability Exposure (CVE) ID: CVE-2004-0554
BugTraq ID: 10538
Bugtraq: 20040620 TSSA-2004-011 - kernel (Google Search)
CERT/CC vulnerability note: VU#973654
En Garde Linux Advisory: ESA-20040621-005
SuSE Security Announcement: SuSE-SA:2004:017 (Google Search)
XForce ISS Database: linux-dos(16412)
CopyrightCopyright (c) 2005 E-Soft Inc.

This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

© 1998-2021 E-Soft Inc. All rights reserved.