How to Buy
This script is Copyright (C) 2009-2015 Tenable Network Security, Inc.
The remote Red Hat host is missing one or more security updates.
Updated kernel packages that fix a number of security issues are now
available for Red Hat Enterprise Linux 2.1 running on 32-bit
This update has been rated as having important security impact by the
Red Hat Security Response Team.
The kernel packages contain the Linux kernel, the core of any Linux
These updated packages fix the following security issues :
* a flaw was found in the IPv4 forwarding base. This could allow a
local, unprivileged user to cause a denial of service. (CVE-2007-2172,
* a flaw was found in the handling of process death signals. This
allowed a local, unprivileged user to send arbitrary signals to the
suid-process executed by that user. Successful exploitation of this
flaw depends on the structure of the suid-program and its signal
handling. (CVE-2007-3848, Important)
* when accessing kernel memory locations, certain Linux kernel drivers
registering a fault handler did not perform required range checks. A
local, unprivileged user could use this flaw to gain read or write
access to arbitrary kernel memory, or possibly cause a denial of
service. (CVE-2008-0007, Important)
* a possible kernel memory leak was found in the Linux kernel Simple
Internet Transition (SIT) INET6 implementation. This could allow a
local, unprivileged user to cause a denial of service. (CVE-2008-2136,
* missing capability checks were found in the SBNI WAN driver which
could allow a local, unprivileged user to bypass intended capability
restrictions. (CVE-2008-3525, Important)
* a flaw was found in the way files were written using truncate() or
ftruncate(). This could allow a local, unprivileged user to acquire
the privileges of a different group and obtain access to sensitive
information. (CVE-2008-4210, Important)
* a race condition in the mincore system core allowed a local,
unprivileged user to cause a denial of service. (CVE-2006-4814,
* a flaw was found in the aacraid SCSI driver. This allowed a local,
unprivileged user to make ioctl calls to the driver which should
otherwise be restricted to privileged users. (CVE-2007-4308, Moderate)
* two buffer overflow flaws were found in the Integrated Services
Digital Network (ISDN) subsystem. A local, unprivileged user could use
these flaws to cause a denial of service. (CVE-2007-6063,
* a flaw was found in the way core dump files were created. If a
local, unprivileged user could make a root-owned process dump a core
file into a user-writable directory, the user could gain read access
to that core file, potentially compromising sensitive information.
* a deficiency was found in the Linux kernel virtual file system (VFS)
implementation. This could allow a local, unprivileged user to attempt
file creation within deleted directories, possibly causing a denial of
service. (CVE-2008-3275, Moderate)
All users of Red Hat Enterprise Linux 2.1 on 32-bit architectures
should upgrade to these updated packages which address these
vulnerabilities. For this update to take effect, the system must be
See also :
Update the affected packages.
Risk factor :
High / CVSS Base Score : 7.8
CVSS Temporal Score : 6.8
Public Exploit Available : true
Family: Red Hat Local Security Checks
Nessus Plugin ID: 35323 ()
Bugtraq ID: 21663252162538726605267012749727686292353064731368
CVE ID: CVE-2006-4814CVE-2007-2172CVE-2007-3848CVE-2007-4308CVE-2007-6063CVE-2007-6151CVE-2007-6206CVE-2008-0007CVE-2008-2136CVE-2008-3275CVE-2008-3525CVE-2008-4210
Upgrade to Nessus Professional today!
Start your free Nessus Cloud trial now!
Begin Free Trial
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.