New! Vulnerability Priority Rating (VPR)
Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it's different from CVSS.
VPR Score: 3.6
SynopsisThe remote Fedora host is missing a security update.
DescriptionUpdate to kernel 220.127.116.11-rc1:
http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-18.104.22.168 http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-22.214.171.124 http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-126.96.36.199 http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-188.8.131.52 http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-184.108.40.206 http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-220.127.116.11 http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-18.104.22.168 http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-22.214.171.124
CVE-2007-5501: The tcp_sacktag_write_queue function in net/ipv4/tcp_input.c in Linux kernel 2.6.24-rc2 and earlier allows remote attackers to cause a denial of service (crash) via crafted ACK responses that trigger a NULL pointer dereference.
CVE-2007-5500: The wait_task_stopped function in the Linux kernel before 126.96.36.199 checks a TASK_TRACED bit instead of an exit_state value, which allows local users to cause a denial of service (machine crash) via unspecified vectors.
Additional fixes: Fix oops in selinux bitmap code (#394501) Fix oops in netfilter NAT module Major wireless driver updates. libata: fix resume for some devices libata: possible fix for bug #379971 libata:
fix broken sata_sis driver (#365331) Automatically load the Dell dcdbas driver (#248257) Initial FireWire OHCI 1.0 Isochronous Receive support (#344851) Touchpad support for Dell Vostro 1400 and Thinkpad R61 (#375471)
-63: Fix b43 Revision D error messages. Restore ability to add/remove virtual i/fs to mac80211 devices
Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
SolutionUpdate the affected packages.