Family: Debian Local Security Checks --> Category: infos
[DSA1011] DSA-1011-1 kernel-patch-vserver Vulnerability Scan
Vulnerability Scan Summary
Detailed Explanation for this Vulnerability Test
Several vulnerabilities have been discovered in the Debian vserver
support for Linux. The Common Vulnerabilities and Exposures project
identifies the following problems:
Bjørn Steinbrink discovered that the chroot barrier is not set
correctly with util-vserver which may result in unauthorised
escapes from a vserver to the host system.
This vulnerability is limited to the 2.4 kernel patch included in
kernel-patch-vserver. The correction to this problem requires
updating the util-vserver package as well and installing a new
kernel built from the updated kernel-patch-vserver package.
The default policy of util-vserver is set to trust all unknown
capabilities instead of considering them as insecure.
The old stable distribution (woody) does not contain a
For the stable distribution (sarge) this problem has been fixed in
version 126.96.36.199 of kernel-patch-vserver and in version
0.30.204-5sarge3 of util-vserver.
For the unstable distribution (sid) this problem has been fixed in
version 2.3 of kernel-patch-vserver and in version 0.30.208-1 of
We recommend that you upgrade your util-vserver and
kernel-patch-vserver packages and build a new kernel immediately.
Solution : http://www.debian.org/security/2006/dsa-1011
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.