Vulnerabilities > CVE-2002-1573 - Unspecified vulnerability in Linux Kernel
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN linux
nessus
Summary
Unspecified vulnerability in the pcilynx ieee1394 firewire driver (pcilynx.c) in Linux kernel before 2.4.20 has unknown impact and attack vectors, related to "wrap handling."
Vulnerable Configurations
Nessus
NASL family | Red Hat Local Security Checks |
NASL id | REDHAT-RHSA-2002-227.NASL |
description | This kernel update for Red Hat Linux Advanced Server 2.1 addresses some security issues and provides minor bug fixes. The Linux kernel handles the basic functions of the operating system. A number of vulnerabilities were found in the Red Hat Linux Advanced Server kernel. These vulnerabilities could allow a local user to obtain elevated (root) privileges. The vulnerabilities existed in a number of drivers, including stradis, rio500, se401, apm, usbserial, and usbvideo. Additionally, a number of bugs have been fixed, and some small feature enhancements have been added. - Failed READA requests could be interpreted as I/O errors under high load on SMP; this has been fixed. - In rare cases, TLB entries could be corrupted on SMP Pentium IV systems; this potential for corruption has been fixed. Third-party modules will need to be recompiled to take advantage of these fixes. - The latest tg3 driver fixes have been included; the tg3 driver now supports more hardware. - A mechanism is provided to specify the location of core files and to set the name pattern to include the UID, program, hostname, and PID of the process that caused the core dump. A number of SCSI fixes have also been included : - Configure sparse LUNs in the qla2200 driver - Clean up erroneous accounting data as seen by /proc/partitions and iostat - Allow up to 128 scsi disks - Do not start logical units that require manual intervention, avoiding unnecessary startup delays - Improve SCSI layer throughput by properly clustering DMA requests All users of Red Hat Linux Advanced Server are advised to upgrade to the errata packages. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 12330 |
published | 2004-07-06 |
reporter | This script is Copyright (C) 2004-2019 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/12330 |
title | RHEL 2.1 : kernel (RHSA-2002:227) |
Redhat
advisories |
|