Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

Debian Security Advisory DSA 1304-1 (kernel-source-2.6.8)

Information

Severity

Severity

Critical

Family

Family

Debian Local Security Checks

CVSSv2 Base

CVSSv2 Base

9.4

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:L/Au:N/C:N/I:C/A:C

Solution Type

Solution Type

Vendor Patch

Created

Created

16 years ago

Modified

Modified

6 years ago

Summary

The remote host is missing an update to kernel-source-2.6.8 announced via advisory DSA 1304-1.

Insight

Insight

For details on the issues addressed with this update, please visit the referenced security advisories.

Solution

Solution

The following matrix explains which kernel version for which architecture fix the problems mentioned above: Debian 3.1 (sarge) Source 2.6.8-16sarge7 Alpha architecture 2.6.8-16sarge7 AMD64 architecture 2.6.8-16sarge7 HP Precision architecture 2.6.8-6sarge7 Intel IA-32 architecture 2.6.8-16sarge7 Intel IA-64 architecture 2.6.8-14sarge7 Motorola 680x0 architecture 2.6.8-4sarge7 PowerPC architecture 2.6.8-12sarge7 IBM S/390 architecture 2.6.8-5sarge7 Sun Sparc architecture 2.6.8-15sarge7 We recommend that you upgrade your kernel package immediately and reboot https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201304-1