Fedora Core 1 : kernel-2.4.22-1.2194.nptl (2004-186)

This script is Copyright (C) 2004-2015 Tenable Network Security, Inc.


Synopsis :

The remote Fedora Core host is missing a security update.

Description :

Numerous problems referencing userspace memory were identified in
several device drivers by Al Viro using the sparse tool. The Common
Vulnerabilities and Exposures project (cve.mitre.org) assigned the
name CVE-2004-0495 to this issue.

A problem was found where userspace code could execute certain
floating point instructions from signal handlers which would cause the
kernel to lock up. The Common Vulnerabilities and Exposures project
(cve.mitre.org) assigned the name CVE-2004-0554 to this issue.

Previous kernels contained a patch against the framebuffer ioctl code
which turned out to be unnecessary. This has been dropped in this
update.

A memory leak in the E1000 network card driver has been fixed. The
Common Vulnerabilities and Exposures project (cve.mitre.org) assigned
the name CVE-2004-0535 to this issue.

Previously, inappropriate permissions were set on
/proc/scsi/qla2300/HbaApiNode The Common Vulnerabilities and Exposures
project (cve.mitre.org) assigned the name CVE-2004-0587 to this issue.

Support for systems with more than 4GB of memory was previously
unavailable. The 686 SMP kernel now supports this configuration.
(Bugzilla #122960) Support for SMP on 586's was also previously not
included. This has also been rectified. (Bugzilla #111871)

Note that Tenable Network Security has extracted the preceding
description block directly from the Fedora security advisory. Tenable
has attempted to automatically clean and format it as much as possible
without introducing additional issues.

See also :

http://www.nessus.org/u?f8629097

Solution :

Update the affected packages.

Risk factor :

High / CVSS Base Score : 7.2
(CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C)

Family: Fedora Local Security Checks

Nessus Plugin ID: 13731 (fedora_2004-186.nasl)

Bugtraq ID:

CVE ID: CVE-2004-0495
CVE-2004-0535
CVE-2004-0554
CVE-2004-0587

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now