Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Fedora Local Security Checks >> Fedora Core 3 2004-582: kernel


Vulnerability Assessment Details

Fedora Core 3 2004-582: kernel

Vulnerability Assessment Summary
Check for the version of the kernel package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory FEDORA-2004-582 (kernel).

The kernel package contains the Linux kernel (vmlinuz), the core of
any Linux operating system. The kernel handles the basic functions
of the operating system: memory allocation, process allocation, device
input and output, etc.

A large change over previous kernels has been made. The 4G:4G memory
split patch has been dropped, and Fedora kernels now revert back to
the upstream 3G:1G kernel/userspace split.

A number of security fixes are present in this update.



Solution : http://www.fedoranews.org/blog/index.php?p=238
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2005 Tenable Network Security

Cables, Connectors

Dell Latitude E7250 12.5" 256GB Solid State Drive MTFDDAT256MAZ K0NTT ER*
$43.99
Dell Latitude E7250 12.59.5mm Universal Caddy SATA 2nd HDD SSD Hard Drive CD/DVD-ROM
$4.99
9.5mm Universal Caddy SATA 2nd HDD SSD Hard Drive CD/DVD-ROM pictureAsus Zenbook UX330U 13.3" 256GB Solid State Drive SSDSCKKW256H6 ER*
$68.99
Asus Zenbook UX330U 13.3Hikvision E1000N SSD 256GB M.2 SATA 3D TLC Solid State Drive HS-SSD-E1000N-256G
$62.9
Hikvision E1000N SSD 256GB M.2 SATA 3D TLC Solid State Drive HS-SSD-E1000N-256G picture


Discussions

No Discussions have been posted on this vulnerability.