Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.Install Now
Available for macOS, Windows, and Linux
Debian Security Advisory DSA 2668-1 (linux-2.6 - privilege escalation/denial of service/information leak)
Several vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service, information leak or privilege escalation. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2012-2121 Benjamin Herrenschmidt and Jason Baron discovered issues with the IOMMU mapping of memory slots used in KVM device assignment. Local users with the ability to assign devices could cause a denial of service due to a memory page leak. Description truncated. Please see the references for more information.
linux-2.6 on Debian Linux
This check tests the installed software version using the apt package manager.
For the oldstable distribution (squeeze), this problem has been fixed in version 2.6.32-48squeeze3. The following matrix lists additional source packages that were rebuilt for compatibility with or to take advantage of this update: ?Debian 6.0 (squeeze)user-mode-linux2.6.32-1um-4+48squeeze3 We recommend that you upgrade your linux-2.6 and user-mode-linux packages. Note : Debian carefully tracks all known security issues across every linux kernel package in all releases under active security support. However, given the high frequency at which low-severity security issues are discovered in the kernel and the resource requirements of doing an update, updates for lower priority issues will normally not be released for all kernels at the same time. Rather, they will be released in a staggered or 'leap-frog' fashion.
Common Vulnerabilities and Exposures (CVE)