Summary
The remote host is missing an update to kernel-source-2.6.8 et. al.
announced via advisory DSA 1111-2.
Solution
https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201111-2
Insight
It was discovered that a race condition in the process filesystem can lead to privilege escalation.
The following matrix explains which kernel version for which architecture fixes the problem mentioned above:
Debian 3.1 (sarge)
Source 2.6.8-16sarge4
Alpha architecture 2.6.8-16sarge4
AMD64 architecture 2.6.8-12sarge4
Intel IA-32 architecture 2.6.8-16sarge4
Intel IA-64 architecture 2.6.8-14sarge4
PowerPC architecture 2.6.8-12sarge4
Sun Sparc architecture 2.6.8-15sarge4
IBM S/390 2.6.8-5sarge4
Motorola 680x0 2.6.8-4sarge4
HP Precision 2.6.8-6sarge3
FAI 1.9.1sarge3
The initial advisory lacked builds for the IBM S/390, Motorola 680x0 and HP Precision architectures, which are now provided. Also, the kernels for the FAI installer have been updated.
We recommend that you upgrade your kernel package immediately and reboot
Severity
Classification
-
CVE CVE-2006-3625 -
CVSS Base Score: 5.0
AV:N/AC:L/Au:N/C:P/I:N/A:N
Related Vulnerabilities