Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

Debian Security Advisory DSA 922-1 (kernel-source-2.4.27)

Information

Severity

Severity

High

Family

Family

Debian Local Security Checks

CVSSv2 Base

CVSSv2 Base

7.2

CVSSv2 Vector

CVSSv2 Vector

AV:L/AC:L/Au:N/C:C/I:C/A:C

Solution Type

Solution Type

Vendor Patch

Created

Created

16 years ago

Modified

Modified

6 years ago

Summary

The remote host is missing an update to kernel-source-2.4.27 announced via advisory DSA 922-1.

Insight

Insight

Several local and remote vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or the execution of arbitrary code. For details on the vulnerabilities addressed by the missing update, please visit the referenced security advisories. This update also contains a number of corrections for issues that turned out to have no security implication afterwards. The following matrix explains which kernel version for which architecture fix the problems mentioned above: Debian 3.1 (sarge) Source 2.6.8-16sarge1 Alpha architecture 2.6.8-16sarge1 AMD64 architecture 2.6.8-16sarge1 HP Precision architecture 2.6.8-6sarge1 Intel IA-32 architecture 2.6.8-16sarge1 Intel IA-64 architecture 2.6.8-14sarge1 Motorola 680x0 architecture 2.6.8-4sarge1 PowerPC architecture 2.6.8-12sarge1 IBM S/390 architecture 2.6.8-5sarge1 Sun Sparc architecture 2.6.8-15sarge1 We recommend that you upgrade your kernel package immediately and

Solution

Solution

https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20922-1