Family: Gentoo Local Security Checks --> Category: infos
[GLSA-200407-16] Linux Kernel: Multiple DoS and permission vulnerabilities Vulnerability Scan
Vulnerability Scan Summary
Linux Kernel: Multiple DoS and permission vulnerabilities
Detailed Explanation for this Vulnerability Test
The remote host is affected by the vulnerability described in GLSA-200407-16
(Linux Kernel: Multiple DoS and permission vulnerabilities)
2.4 users may not be affected by CVE-2004-0497 if they do not use remote
network filesystems and do not have support for any such filesystems in
their kernel configuration. All 2.6 users are affected by the /proc
attribute issue and the only known workaround is to disable /proc support.
The VServer flaw applies only to vserver-sources, and no workaround is
currently known for the issue. There is no known fix to CVE-2004-0447,
CVE-2004-0496 or CVE-2004-0565 other than to upgrade the kernel to a
As a result, all users affected by any of these vulnerabilities should
upgrade their kernels to ensure the integrity of their systems.
Users are encouraged to upgrade to the latest available sources for their
# emerge sync
# emerge -pv your-favorite-sources
# emerge your-favorite-sources
# # Follow usual procedure for compiling and installing a kernel.
# # If you use genkernel, run genkernel as you would do normally.
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.