Mandrake Linux Security Advisory : kernel (MDKSA-2004:066)

High Nessus Plugin ID 14165


The remote Mandrake Linux host is missing one or more security updates.


A number of vulnerabilities were discovered in the Linux kernel that are corrected with this update :

Multiple vulnerabilities were found by the Sparse source checker that could allow local users to elevate privileges or gain access to kernel memory (CVE-2004-0495).

Missing Discretionary Access Controls (DAC) checks in the chown(2) system call could allow an attacker with a local account to change the group ownership of arbitrary files, which could lead to root privileges on affected systems (CVE-2004-0497).

An information leak vulnerability that affects only ia64 systems was fixed (CVE-2004-0565).

Insecure permissions on /proc/scsi/qla2300/HbaApiNode could allow a local user to cause a DoS on the system; this only affects Mandrakelinux 9.2 and below (CVE-2004-0587).

A vulnerability that could crash the kernel has also been fixed. This crash, however, can only be exploited via root (in br_if.c).

The provided packages are patched to fix these vulnerabilities. All users are encouraged to upgrade to these updated kernels.

To update your kernel, please follow the directions located at :


Update the affected packages.

Plugin Details

Severity: High

ID: 14165

File Name: mandrake_MDKSA-2004-066.nasl

Version: $Revision: 1.19 $

Type: local

Published: 2004/07/31

Modified: 2013/05/31

Dependencies: 12634

Risk Information

Risk Factor: High


Base Score: 7.2

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:kernel-, p-cpe:/a:mandriva:linux:kernel-, p-cpe:/a:mandriva:linux:kernel-, p-cpe:/a:mandriva:linux:kernel-, p-cpe:/a:mandriva:linux:kernel-enterprise-, p-cpe:/a:mandriva:linux:kernel-enterprise-, p-cpe:/a:mandriva:linux:kernel-enterprise-, p-cpe:/a:mandriva:linux:kernel-enterprise-, p-cpe:/a:mandriva:linux:kernel-i686-up-4GB-, p-cpe:/a:mandriva:linux:kernel-i686-up-4GB-, p-cpe:/a:mandriva:linux:kernel-i686-up-4GB-, p-cpe:/a:mandriva:linux:kernel-p3-smp-64GB-, p-cpe:/a:mandriva:linux:kernel-p3-smp-64GB-, p-cpe:/a:mandriva:linux:kernel-p3-smp-64GB-, p-cpe:/a:mandriva:linux:kernel-secure-, p-cpe:/a:mandriva:linux:kernel-secure-, p-cpe:/a:mandriva:linux:kernel-secure-, p-cpe:/a:mandriva:linux:kernel-smp-, p-cpe:/a:mandriva:linux:kernel-smp-, p-cpe:/a:mandriva:linux:kernel-smp-, p-cpe:/a:mandriva:linux:kernel-smp-, p-cpe:/a:mandriva:linux:kernel-source, p-cpe:/a:mandriva:linux:kernel-source-stripped, cpe:/o:mandrakesoft:mandrake_linux:10.0, cpe:/o:mandrakesoft:mandrake_linux:9.1, cpe:/o:mandrakesoft:mandrake_linux:9.2

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Patch Publication Date: 2004/07/06

Reference Information

CVE: CVE-2004-0495, CVE-2004-0497, CVE-2004-0565, CVE-2004-0587

MDKSA: 2004:066