7.8 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:C/I:N/A:N
0.001 Low
EPSS
Percentile
18.0%
Several vulnerabilities have been discovered in the Linux kernel that
may lead to denial of service, privilege escalation or a leak of
sensitive memory. The Common Vulnerabilities and Exposures project
identifies the following problems:
For the oldstable distribution (etch), this problem has been fixed in
version 2.6.18.dfsg.1-24etch4.
We recommend that you upgrade your linux-2.6, fai-kernels, and
user-mode-linux packages.
Note: Debian carefully tracks all known security issues across every
linux kernel package in all releases under active security support.
However, given the high frequency at which low-severity security
issues are discovered in the kernel and the resource requirements of
doing an update, updates for lower priority issues will normally not
be released for all kernels at the same time. Rather, they will be
released in a staggered or “leap-frog” fashion.
The following matrix lists additional source packages that were rebuilt for
compatibility with or to take advantage of this update:
Debian 4.0 (etch) | |
---|---|
fai-kernels | 1.17+etch.24etch4 |
user-mode-linux | 2.6.18-1um-2etch.24etch4 |