Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> SuSE Local Security Checks >> SUSE-SA:2006:042: kernel


Vulnerability Assessment Details

SUSE-SA:2006:042: kernel

Vulnerability Assessment Summary
Check for the version of the kernel package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory SUSE-SA:2006:042 (kernel).


The Linux kernel has been updated to fix several security issues.

This advisory refers to kernel updates for SUSE Linux 9.1 - 10.1.


The SUSE Linux 9.1 kernel update is the final SUSE Linux 9.1 YOU
update (see separate announcement from some days ago).


Solution : http://www.suse.de/security/http://www.novell.com/linux/security/advisories/2006_42_kernel.html
Network Security Threat Level: High

Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2007 Tenable Network Security

Cables, Connectors

MICRON MT36JDZS51272PZ 16GB (4x4GB) PC3-10600R VLP 1333MHz MEMORY SERVER RAM
$20.0
MICRON MT36JDZS51272PZ 16GB (4x4GB) PC3-10600R VLP 1333MHz MEMORY SERVER RAM  pictureServer RAM 16G 2x 8GB PC3L-10600R ECC REG DDR3L 1333 2Rx4 Memory FIT Dell HP IBM
$43.95
Server RAM 16G 2x 8GB PC3L-10600R ECC REG DDR3L 1333 2Rx4 Memory FIT Dell HP IBM picture794752M - x3650M2(HS2.5)/2xE5530/8GB/MR10i/2x675W/No Rail/46D2516 Upg Refurbish
$672.28
794752M - x3650M2(HS2.5)/2xE5530/8GB/MR10i/2x675W/No Rail/46D2516 Upg Refurbish pictureIBM x3550 x3650 M2 xSeries Server Board Motherboard with 2x Intel Xeon E5504
$19.99
IBM x3550 x3650 M2 xSeries Server Board Motherboard with 2x Intel Xeon E5504  picture


Discussions

No Discussions have been posted on this vulnerability.