Debian Security Advisory DSA 1103-1 (kernel-source-2.6.8)

Summary
The remote host is missing an update to kernel-source-2.6.8 announced via advisory DSA 1103-1.
Solution
https://secure1.securityspace.com/smysecure/catid.html?in=DSA%201103-1
Insight
Several local and remote vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or the execution of arbitrary code. For details on these issues, please visit the referenced advisories. The following matrix explains which kernel version for which architecture fix the problems mentioned above: Debian 3.1 (sarge) Source 2.6.8-16sarge3 Alpha architecture 2.6.8-16sarge3 HP Precision architecture 2.6.8-6sarge3 Intel IA-32 architecture 2.6.8-16sarge3 Intel IA-64 architecture 2.6.8-14sarge3 Motorola 680x0 architecture 2.6.8-4sarge3 PowerPC architecture 2.6.8-12sarge3 IBM S/390 architecture 2.6.8-5sarge3 Sun Sparc architecture 2.6.8-15sarge3 Due to technical problems the built amd64 packages couldn't be processed by the archive script. Once this problem is resolved, an updated DSA 1103-2 will be sent out with the checksums for amd64. The following matrix lists additional packages that were rebuilt for compatibility with or to take advantage of this update: Debian 3.1 (sarge) fai-kernels 1.9.1sarge2 We recommend that you upgrade your kernel package immediately and reboot