Mandrake Linux Security Advisory : kernel (MDKSA-2004:066)

high Nessus Plugin ID 14165

Synopsis

The remote Mandrake Linux host is missing one or more security updates.

Description

A number of vulnerabilities were discovered in the Linux kernel that are corrected with this update :

Multiple vulnerabilities were found by the Sparse source checker that could allow local users to elevate privileges or gain access to kernel memory (CVE-2004-0495).

Missing Discretionary Access Controls (DAC) checks in the chown(2) system call could allow an attacker with a local account to change the group ownership of arbitrary files, which could lead to root privileges on affected systems (CVE-2004-0497).

An information leak vulnerability that affects only ia64 systems was fixed (CVE-2004-0565).

Insecure permissions on /proc/scsi/qla2300/HbaApiNode could allow a local user to cause a DoS on the system; this only affects Mandrakelinux 9.2 and below (CVE-2004-0587).

A vulnerability that could crash the kernel has also been fixed. This crash, however, can only be exploited via root (in br_if.c).

The provided packages are patched to fix these vulnerabilities. All users are encouraged to upgrade to these updated kernels.

To update your kernel, please follow the directions located at :

http://www.mandrakesoft.com/security/kernelupdate

Solution

Update the affected packages.

Plugin Details

Severity: High

ID: 14165

File Name: mandrake_MDKSA-2004-066.nasl

Version: 1.23

Type: local

Published: 7/31/2004

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.4

CVSS v2

Risk Factor: High

Base Score: 7.2

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:kernel-2.4.21.0.32mdk, p-cpe:/a:mandriva:linux:kernel-2.4.22.36mdk, p-cpe:/a:mandriva:linux:kernel-2.4.25.7mdk, p-cpe:/a:mandriva:linux:kernel-2.6.3.15mdk, p-cpe:/a:mandriva:linux:kernel-enterprise-2.4.21.0.32mdk, p-cpe:/a:mandriva:linux:kernel-enterprise-2.4.22.36mdk, p-cpe:/a:mandriva:linux:kernel-enterprise-2.4.25.7mdk, p-cpe:/a:mandriva:linux:kernel-enterprise-2.6.3.15mdk, p-cpe:/a:mandriva:linux:kernel-i686-up-4gb-2.4.22.36mdk, p-cpe:/a:mandriva:linux:kernel-i686-up-4gb-2.4.25.7mdk, p-cpe:/a:mandriva:linux:kernel-i686-up-4gb-2.6.3.15mdk, p-cpe:/a:mandriva:linux:kernel-p3-smp-64gb-2.4.22.36mdk, p-cpe:/a:mandriva:linux:kernel-p3-smp-64gb-2.4.25.7mdk, p-cpe:/a:mandriva:linux:kernel-p3-smp-64gb-2.6.3.15mdk, p-cpe:/a:mandriva:linux:kernel-secure-2.4.21.0.32mdk, p-cpe:/a:mandriva:linux:kernel-secure-2.4.22.36mdk, p-cpe:/a:mandriva:linux:kernel-secure-2.6.3.15mdk, p-cpe:/a:mandriva:linux:kernel-smp-2.4.21.0.32mdk, p-cpe:/a:mandriva:linux:kernel-smp-2.4.22.36mdk, p-cpe:/a:mandriva:linux:kernel-smp-2.4.25.7mdk, p-cpe:/a:mandriva:linux:kernel-smp-2.6.3.15mdk, p-cpe:/a:mandriva:linux:kernel-source, p-cpe:/a:mandriva:linux:kernel-source-stripped, cpe:/o:mandrakesoft:mandrake_linux:10.0, cpe:/o:mandrakesoft:mandrake_linux:9.1, cpe:/o:mandrakesoft:mandrake_linux:9.2

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 7/6/2004

Reference Information

CVE: CVE-2004-0495, CVE-2004-0497, CVE-2004-0565, CVE-2004-0587

MDKSA: 2004:066