Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.59587
Category:Fedora Local Security Checks
Title:Fedora Core 6 FEDORA-2007-655 (kernel)
Summary:NOSUMMARY
Description:Description:

The remote host is missing an update to kernel
announced via advisory FEDORA-2007-655.

The kernel package contains the Linux kernel (vmlinuz), the core of any
Linux operating system. The kernel handles the basic functions
of the operating system: memory allocation, process allocation, device
input and output, etc.

Update Information:

Rebase kernel to 2.6.22.1:
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.22
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.22.1

Includes the CFS scheduler from upstream kernel 2.6.23.

Fixes since initial 2.6.22 test kernel was released:
Fix timer problems and failure to boot.
Fix failure to boot on PS3.
Fix failure to initialize Hpt37x ATA controllers.
Hopefully fix atl1 ethernet controller DMA.
Add RAID autostart (dropped during initial rebase.)
Fix oops in xfrm4, reported on Fedora 7.

CVE-2007-3642:
The decode_choice function in
net/netfilter/bf_conntrack_h323_asn1.c in the Linux kernel
before 2.6.22 allows remote attackers to cause a denial of
service (crash) via an encoded, out-of-range index value for
a choice field, which triggers a NULL pointer dereference.

Solution: Apply the appropriate updates.

This update can be downloaded from:
http://download.fedora.redhat.com/pub/fedora/linux/core/updates/6/

This update can be installed with the 'yum' update program. Use 'yum update
package-name' at the command line. For more information, refer to 'Managing
Software with yum,' available at http://fedora.redhat.com/docs/yum/.

http://www.securityspace.com/smysecure/catid.html?in=FEDORA-2007-655

Risk factor : High

CVSS Score:
7.8

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2007-3642
BugTraq ID: 24818
http://www.securityfocus.com/bid/24818
Debian Security Information: DSA-1356 (Google Search)
http://www.debian.org/security/2007/dsa-1356
http://www.mandriva.com/security/advisories?name=MDKSA-2007:195
http://osvdb.org/37117
http://secunia.com/advisories/25955
http://secunia.com/advisories/26450
http://secunia.com/advisories/27212
http://www.ubuntu.com/usn/usn-510-1
http://www.vupen.com/english/advisories/2007/2466
CopyrightCopyright (c) 2007 E-Soft Inc. http://www.securityspace.com

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.