Mandrake Linux Security Advisory : kernel (MDKSA-2004:037)

High Nessus Plugin ID 14136


The remote Mandrake Linux host is missing one or more security updates.


A vulnerability was found in the framebuffer driver of the 2.6 kernel.
This is due to incorrect use of the fb_copy_cmap function.

A vulnerability has been found in the Linux kernel in the ip_setsockopt() function code. There is an exploitable integer overflow inside the code handling the MCAST_MSFILTER socket option in the IP_MSFILTER_SIZE macro calculation. This issue is present in both 2.4 (2.4.25) and 2.6 kernels. (CVE-2004-0424)

There is a minor issue with the static buffer in 2.4 kernel's panic() function. Although it's a possibly buffer overflow, it most like not exploitable due to the nature of panic(). (CVE-2004-0394)

In do_fork(), if an error occurs after the mm_struct for the child has been allocated, it is never freed. The exit_mm() meant to free it increments the mm_count and this count is never decremented. (For a running process that is exitting, schedule() takes care this; however, the child process being cleaned up is not running.) In the CLONE_VM case, the parent's mm_struct will get an extra mm_count and so it will never be freed. This issue is present in both 2.4 and 2.6 kernels.

The provided packages are patched to fix these vulnerabilities. All users are encouraged to upgrade to these updated kernels.

To update your kernel, please follow the directions located at :


Update the affected packages.

Plugin Details

Severity: High

ID: 14136

File Name: mandrake_MDKSA-2004-037.nasl

Version: $Revision: 1.17 $

Type: local

Published: 2004/07/31

Modified: 2013/05/31

Dependencies: 12634

Risk Information

Risk Factor: High


Base Score: 7.2

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:kernel-, p-cpe:/a:mandriva:linux:kernel-, p-cpe:/a:mandriva:linux:kernel-, p-cpe:/a:mandriva:linux:kernel-, p-cpe:/a:mandriva:linux:kernel-enterprise-, p-cpe:/a:mandriva:linux:kernel-enterprise-, p-cpe:/a:mandriva:linux:kernel-enterprise-, p-cpe:/a:mandriva:linux:kernel-enterprise-, p-cpe:/a:mandriva:linux:kernel-i686-up-4GB-, p-cpe:/a:mandriva:linux:kernel-i686-up-4GB-, p-cpe:/a:mandriva:linux:kernel-i686-up-4GB-, p-cpe:/a:mandriva:linux:kernel-p3-smp-64GB-, p-cpe:/a:mandriva:linux:kernel-p3-smp-64GB-, p-cpe:/a:mandriva:linux:kernel-p3-smp-64GB-, p-cpe:/a:mandriva:linux:kernel-secure-, p-cpe:/a:mandriva:linux:kernel-secure-, p-cpe:/a:mandriva:linux:kernel-secure-, p-cpe:/a:mandriva:linux:kernel-smp-, p-cpe:/a:mandriva:linux:kernel-smp-, p-cpe:/a:mandriva:linux:kernel-smp-, p-cpe:/a:mandriva:linux:kernel-smp-, p-cpe:/a:mandriva:linux:kernel-source, p-cpe:/a:mandriva:linux:kernel-source-stripped, cpe:/o:mandrakesoft:mandrake_linux:10.0, cpe:/o:mandrakesoft:mandrake_linux:9.1, cpe:/o:mandrakesoft:mandrake_linux:9.2

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Patch Publication Date: 2004/04/27

Reference Information

CVE: CVE-2004-0229, CVE-2004-0394, CVE-2004-0424, CVE-2004-0427

MDKSA: 2004:037