Description: | Description:
The remote host is missing an update to linux-source-2.6.8.1/-2.6.10/-2.6.12 announced via advisory USN-219-1.
A security issue affects the following Ubuntu releases:
Ubuntu 4.10 (Warty Warthog) Ubuntu 5.04 (Hoary Hedgehog) Ubuntu 5.10 (Breezy Badger)
The following Ubuntu 4.10 packages are affected:
linux-image-2.6.8.1-6-* linux-patch-debian-2.6.8.1
The following Ubuntu 5.04 packages are affected:
linux-image-2.6.10-6-* linux-patch-ubuntu-2.6.10
The following Ubuntu 5.10 packages are affected:
linux-image-2.6.12-10-* linux-patch-ubuntu-2.6.12
For details on the issues resolved, please visit the referenced security advisories.
Solution: The problem can be corrected by installing the affected package, which provides a new kernel. Unless you manually uninstalled the standard kernel metapackages (linux-image-386, linux-image-powerpc, or linux-image-amd64-generic), this will happen automatically with a standard system upgrade.
ATTENTION: Due to an unavoidable ABI change this kernel has been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. If you use linux-restricted-modules, you have to update that package as well to get modules which work with the new kernel version. Unless you manually uninstalled the standard kernel metapackages (linux-386, linux-powerpc, linux-amd64-generic), a standard system upgrade will automatically perform this as well.
http://www.securityspace.com/smysecure/catid.html?in=USN-219-1
Risk factor : Medium
CVSS Score: 5.0
|