7.8 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:N/I:N/A:C
Several security related problems have been discovered in the Linux
kernel which may lead to a denial of service or even the execution of
arbitrary code. The Common Vulnerabilities and Exposures project
identifies the following problems:
The following matrix explains which kernel version for which
architecture fixes the problem mentioned above:
stable (sarge) | |
---|---|
Source | 2.4.27-10sarge4 |
Alpha architecture | 2.4.27-10sarge4 |
ARM architecture | 2.4.27-2sarge4 |
Intel IA-32 architecture | 2.4.27-10sarge4 |
Intel IA-64 architecture | 2.4.27-10sarge4 |
Motorola 680x0 architecture | 2.4.27-3sarge4 |
MIPS architectures | 2.4.27-10.sarge4.040815-1 |
PowerPC architecture | 2.4.27-10sarge4 |
IBM S/390 | 2.4.27-2sarge4 |
Sun Sparc architecture | 2.4.27-9sarge4 |
FAI | 1.9.1sarge4 |
mindi-kernel | 2.4.27-2sarge3 |
kernel-image-speakup-i386 | 2.4.27-1.1sarge3 |
systemimager | 3.2.3-6sarge3 |
For the unstable distribution (sid) these problems won’t be fixed
anymore in the 2.4 kernel series.
We recommend that you upgrade your kernel package and reboot the
machine. If you have built a custom kernel from the kernel source
package, you will need to rebuild to take advantage of these fixes.
CPE | Name | Operator | Version |
---|---|---|---|
systemimager | eq | 3.2.3-6sarge2 | |
systemimager | eq | 3.2.3-6 | |
systemimager | eq | 3.2.3-6sarge1 |