![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.59587 |
Category: | Fedora Local Security Checks |
Title: | Fedora Core 6 FEDORA-2007-655 (kernel) |
Summary: | NOSUMMARY |
Description: | Description: The remote host is missing an update to kernel announced via advisory FEDORA-2007-655. The kernel package contains the Linux kernel (vmlinuz), the core of any Linux operating system. The kernel handles the basic functions of the operating system: memory allocation, process allocation, device input and output, etc. Update Information: Rebase kernel to 2.6.22.1: http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.22 http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.22.1 Includes the CFS scheduler from upstream kernel 2.6.23. Fixes since initial 2.6.22 test kernel was released: Fix timer problems and failure to boot. Fix failure to boot on PS3. Fix failure to initialize Hpt37x ATA controllers. Hopefully fix atl1 ethernet controller DMA. Add RAID autostart (dropped during initial rebase.) Fix oops in xfrm4, reported on Fedora 7. CVE-2007-3642: The decode_choice function in net/netfilter/bf_conntrack_h323_asn1.c in the Linux kernel before 2.6.22 allows remote attackers to cause a denial of service (crash) via an encoded, out-of-range index value for a choice field, which triggers a NULL pointer dereference. Solution: Apply the appropriate updates. This update can be downloaded from: http://download.fedora.redhat.com/pub/fedora/linux/core/updates/6/ This update can be installed with the 'yum' update program. Use 'yum update package-name' at the command line. For more information, refer to 'Managing Software with yum,' available at http://fedora.redhat.com/docs/yum/. http://www.securityspace.com/smysecure/catid.html?in=FEDORA-2007-655 Risk factor : High CVSS Score: 7.8 |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2007-3642 BugTraq ID: 24818 http://www.securityfocus.com/bid/24818 Debian Security Information: DSA-1356 (Google Search) http://www.debian.org/security/2007/dsa-1356 http://www.mandriva.com/security/advisories?name=MDKSA-2007:195 http://osvdb.org/37117 http://secunia.com/advisories/25955 http://secunia.com/advisories/26450 http://secunia.com/advisories/27212 http://www.ubuntu.com/usn/usn-510-1 http://www.vupen.com/english/advisories/2007/2466 |
Copyright | Copyright (c) 2007 E-Soft Inc. http://www.securityspace.com |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |