Summary
The remote host is missing an update to kernel-source-2.6.8 announced via advisory DSA 1103-1.
Solution
https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201103-1
Insight
Several local and remote vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or the execution of arbitrary code. For details on these issues, please visit the referenced advisories.
The following matrix explains which kernel version for which architecture fix the problems mentioned above:
Debian 3.1 (sarge)
Source 2.6.8-16sarge3
Alpha architecture 2.6.8-16sarge3
HP Precision architecture 2.6.8-6sarge3
Intel IA-32 architecture 2.6.8-16sarge3
Intel IA-64 architecture 2.6.8-14sarge3
Motorola 680x0 architecture 2.6.8-4sarge3
PowerPC architecture 2.6.8-12sarge3
IBM S/390 architecture 2.6.8-5sarge3
Sun Sparc architecture 2.6.8-15sarge3
Due to technical problems the built amd64 packages couldn't be processed by the archive script. Once this problem is resolved, an updated DSA 1103-2 will be sent out with the checksums for amd64.
The following matrix lists additional packages that were rebuilt for compatibility with or to take advantage of this update:
Debian 3.1 (sarge)
fai-kernels 1.9.1sarge2
We recommend that you upgrade your kernel package immediately and reboot
Severity
Classification
-
CVSS Base Score: 10.0
AV:N/AC:L/Au:N/C:C/I:C/A:C
Related Vulnerabilities