Debian Security Advisory DSA 921-1 (kernel-source-2.4.27)

Published: 2008-01-17 22:07:13
CVE Author: NIST National Vulnerability Database (NVD)

CVSS Base Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:P

Recommendations:
https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20921-1

Technical Details:
Several local and remote vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or the execution of arbitrary code. For details on the vulnerabilities addressed by the missing update, please visit the referenced security advisories. The following matrix explains which kernel version for which architecture fix the problems mentioned above: Debian 3.1 (sarge) Source 2.4.27-10sarge1 Alpha architecture 2.4.27-10sarge1 ARM architecture 2.4.27-2sarge1 Intel IA-32 architecture 2.4.27-10sarge1 Intel IA-64 architecture 2.4.27-10sarge1 Motorola 680x0 architecture 2.4.27-3sarge1 Big endian MIPS architecture 2.4.27-10.sarge1.040815-1 Little endian MIPS architecture 2.4.27-10.sarge1.040815-1 PowerPC architecture 2.4.27-10sarge1 IBM S/390 architecture 2.4.27-2sarge1 Sun Sparc architecture 2.4.27-9sarge1 We recommend that you upgrade your kernel Linux Distribution Package immediately and

Summary:
The remote host is missing an update to kernel-source-2.4.27 announced via advisory DSA 921-1.

Detection Type:
Linux Distribution Package

Solution Type:
Vendor Patch

NIST (National Institute of Standards and Technology) NVD (National Vulnerability Database)

https://nvd.nist.gov/vuln/detail/CVE-2005-0756
https://nvd.nist.gov/vuln/detail/CVE-2005-0757
https://nvd.nist.gov/vuln/detail/CVE-2005-1762
https://nvd.nist.gov/vuln/detail/CVE-2005-1767
https://nvd.nist.gov/vuln/detail/CVE-2005-1768
https://nvd.nist.gov/vuln/detail/CVE-2005-2456
https://nvd.nist.gov/vuln/detail/CVE-2005-2458
https://nvd.nist.gov/vuln/detail/CVE-2005-2459
https://nvd.nist.gov/vuln/detail/CVE-2005-2553
https://nvd.nist.gov/vuln/detail/CVE-2005-2801
https://nvd.nist.gov/vuln/detail/CVE-2005-2872
https://nvd.nist.gov/vuln/detail/CVE-2005-3275

SecurityFocus Bugtraq ID:

https://www.securityfocus.com/bid/14477

Search
Severity
Medium
CVSS Score
5.0

You never have to pay for a vulnerability scanning and management software again.

Tired of paying a subscription 'per asset' or 'per IP'? Well you can officially cancel your current subscription. Mageni provides a free, open source and enterprise-ready vulnerability scanning and management platform which helps you to find, prioritize, remediate and manage your vulnerabilities. It is free and always will be.