Kernel update fixes denial of service and privilege escalation vulnerabilities in Linux versions.
Reporter | Title | Published | Views | Family All 54 |
---|---|---|---|---|
![]() | (RHSA-2004:255) kernel security update | 17 Jun 200400:00 | – | redhat |
![]() | (RHSA-2004:327) kernel security update | 18 Aug 200400:00 | – | redhat |
![]() | RHEL 3 : kernel (RHSA-2004:255) | 6 Jul 200400:00 | – | nessus |
![]() | RHEL 2.1 : kernel (RHSA-2004:260) | 6 Jul 200400:00 | – | nessus |
![]() | Fedora Core 1 : kernel-2.4.22-1.2194.nptl (2004-186) | 23 Jul 200400:00 | – | nessus |
![]() | SuSE-SA:2004:017: kernel | 25 Jul 200400:00 | – | nessus |
![]() | Slackware 8.1 / 9.0 / 9.1 / current : kernel DoS (SSA:2004-167-01) | 13 Jul 200500:00 | – | nessus |
![]() | Mandrake Linux Security Advisory : kernel (MDKSA-2004:062) | 31 Jul 200400:00 | – | nessus |
![]() | Mandrake Linux Security Advisory : kernel (MDKSA-2004:066) | 31 Jul 200400:00 | – | nessus |
![]() | SUSE-SA:2004:020: kernel | 25 Jul 200400:00 | – | nessus |
OS | OS Version | Architecture | Package | Package Version | Filename |
---|---|---|---|---|---|
RedHat | any | i686 | kernel-summit | 2.4.9-e.41 | kernel-summit-2.4.9-e.41.i686.rpm |
RedHat | any | i386 | kernel-doc | 2.4.9-e.41 | kernel-doc-2.4.9-e.41.i386.rpm |
RedHat | any | i386 | kernel-boot | 2.4.9-e.41 | kernel-BOOT-2.4.9-e.41.i386.rpm |
RedHat | any | i686 | kernel-smp | 2.4.9-e.41 | kernel-smp-2.4.9-e.41.i686.rpm |
RedHat | any | i686 | kernel-debug | 2.4.9-e.41 | kernel-debug-2.4.9-e.41.i686.rpm |
RedHat | any | athlon | kernel-smp | 2.4.9-e.41 | kernel-smp-2.4.9-e.41.athlon.rpm |
RedHat | any | i686 | kernel | 2.4.9-e.41 | kernel-2.4.9-e.41.i686.rpm |
RedHat | any | i686 | kernel-enterprise | 2.4.9-e.41 | kernel-enterprise-2.4.9-e.41.i686.rpm |
RedHat | any | i386 | kernel-headers | 2.4.9-e.41 | kernel-headers-2.4.9-e.41.i386.rpm |
RedHat | any | athlon | kernel | 2.4.9-e.41 | kernel-2.4.9-e.41.athlon.rpm |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo