Summary
The remote host is missing an update to kernel-source-2.4.27 announced via advisory DSA 1237-1.
Solution
https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201237-1
Insight
Several local and remote vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or the execution of arbitrary code. For details, please visit the referenced security advisories.
The following matrix explains which kernel version for which architecture fix the problems mentioned above:
Debian 3.1 (sarge)
Source 2.4.27-10sarge5
Alpha architecture 2.4.27-10sarge5
ARM architecture 2.4.27-2sarge5
Intel IA-32 architecture 2.4.27-10sarge5
Intel IA-64 architecture 2.4.27-10sarge5
Motorola 680x0 architecture 2.4.27-3sarge5
Big endian MIPS 2.4.27-10.sarge4.040815-2 Little endian MIPS 2.4.27-10.sarge4.040815-2 PowerPC architecture 2.4.27-10sarge5
IBM S/390 architecture 2.4.27-2sarge5
Sun Sparc architecture 2.4.27-9sarge5
The following matrix lists additional packages that were rebuilt for compatibility with or to take advantage of this update:
Debian 3.1 (sarge)
fai-kernels 1.9.1sarge5
kernel-image-2.4.27-speakup 2.4.27-1.1sarge4
mindi-kernel 2.4.27-2sarge4
systemimager 3.2.3-6sarge4
We recommend that you upgrade your kernel package immediately and reboot
Severity
Classification
-
CVE CVE-2005-4093, CVE-2006-4093, CVE-2006-4538, CVE-2006-4997, CVE-2006-5174, CVE-2006-5649, CVE-2006-5871 -
CVSS Base Score: 7.1
AV:N/AC:M/Au:N/C:N/I:N/A:C
Related Vulnerabilities