This script is Copyright (C) 2005-2016 Tenable Network Security, Inc.
The remote Slackware host is missing a security update.
New kernels are available for Slackware 9.1 and -current to fix a
bounds-checking problem in the kernel's mremap() call which could be
used by a local attacker to gain root privileges. Please note that
this is not the same issue as CAN-2003-0985 which was fixed in early
January. The kernels in Slackware 8.1 and 9.0 that were updated in
January are not vulnerable to this new issue because the patch from
Solar Designer that was used to fix the CAN-2003-0985 bugs also
happened to fix the problem that was discovered later. Sites running
Slackware 9.1 or -current should upgrade to a new kernel. After
installing the new kernel, be sure to run 'lilo'.
See also :
Update the affected kernel-ide and / or kernel-source packages.
Risk factor :
High / CVSS Base Score : 7.2
Public Exploit Available : true