Mandrake Linux Security Advisory : kernel (MDKSA-2006:059)

high Nessus Plugin ID 21133
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.


The remote Mandrake Linux host is missing one or more security updates.


A number of vulnerabilities were discovered and corrected in the Linux 2.6 kernel :

sysctl.c in the Linux kernel prior to allows local users to cause a Denial of Service (kernel oops) and possibly execute code by opening an interface file in /proc/sys/net/ipv4/conf/, waiting until the interface is unregistered, then obtaining and modifying function pointers in memory that was used for the ctl_table (CVE-2005-2709).

Multiple vulnerabilities in versions prior to allow local users to cause a DoS (oops from null dereference) via fput in a 32bit ioctl on 64-bit x86 systems or sockfd_put in the 32-bit routing_ioctl function on 64-bit systems (CVE-2005-3044). Note that this was previously partially corrected in MDKSA-2005:235.

Prior to 2.6.14, the kernel's atm module allows local users to cause a DoS (panic) via certain socket calls that produce inconsistent reference counts for loadable protocol modules (CVE-2005-3359).

A race condition in the (1) add_key, (2) request_key, and (3) keyctl functions in the 2.6.x kernel allows local users to cause a DoS (crash) or read sensitive kernel memory by modifying the length of a string argument between the time that the kernel calculates the length and when it copies the data into kernel memory (CVE-2006-0457).

Prior to, the kernel allows local users to obtain sensitive information via a crafted XFS ftruncate call, which may return stale data (CVE-2006-0554).

Prior to, the kernel allows local users to cause a DoS (NFS client panic) via unknown attack vectors related to the use of O_DIRECT (CVE-2006-0555).

Prior to an including kernel 2.6.16, sys_mbind in mempolicy.c does not sanity check the maxnod variable before making certain computations, which has an unknown impact and attack vectors (CVE-2006-0557).

Prior to, the kernel allows local users to cause a DoS ('endless recursive fault') via unknown attack vectors related to a 'bad elf entry address' on Intel processors (CVE-2006-0741).

Prior to, the die_if_kernel function in the kernel can allow local users to cause a DoS by causing user faults on Itanium systems (CVE-2006-00742).

A race in the signal-handling code which allows a process to become unkillable when the race is triggered was also fixed.

In addition to these security fixes, other fixes have been included such as :

- add ich8 support

- libata locking rewrite

- libata clear ATA_QCFLAG_ACTIVE flag before calling the completion callback

- support the Acer Aspire 5xxx/3xxx series in the acerhk module

- USB storage: remove info sysfs file as it violates the sysfs one value per file rule

- fix OOPS in sysfs_hash_and_remove_file()

- pl2303 USB driver fixes; makes pl2303HX chip work correctly

- fix OOPS in IPMI driver which is probably caused when trying to use ACPI functions when ACPI was not properly initialized

- fix de_thread() racy BUG_ON()

The provided packages are patched to fix these vulnerabilities. All users are encouraged to upgrade to these updated kernels.

To update your kernel, please follow the directions located at :

Please note that users using the LSI Logic 53c1030 dual-channel ultra 320 SCSI card will need to re-create their initrd images manually prior to rebooting in order to fix a bug that prevents booting. A future update will correct this problem. To do this, execute :

# rm /boot/initrd-2.6.12-18mdk.img # mkinitrd /boot/initrd-2.6.12-18mdk.img 2.6.12-18mdk --with-module=mptspi


Update the affected packages.

Plugin Details

Severity: High

ID: 21133

File Name: mandrake_MDKSA-2006-059.nasl

Version: 1.15

Type: local

Published: 3/23/2006

Updated: 1/6/2021

Dependencies: ssh_get_info.nasl

Risk Information


Risk Factor: Medium

Score: 6.3


Risk Factor: High

Base Score: 7.1

Vector: AV:N/AC:H/Au:N/C:C/I:N/A:C

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:kernel-, p-cpe:/a:mandriva:linux:kernel-BOOT-, p-cpe:/a:mandriva:linux:kernel-i586-up-1GB-, p-cpe:/a:mandriva:linux:kernel-i686-up-4GB-, p-cpe:/a:mandriva:linux:kernel-smp-, p-cpe:/a:mandriva:linux:kernel-source-2.6, p-cpe:/a:mandriva:linux:kernel-source-stripped-2.6, p-cpe:/a:mandriva:linux:kernel-xbox-, p-cpe:/a:mandriva:linux:kernel-xen0-, p-cpe:/a:mandriva:linux:kernel-xenU-, cpe:/o:mandriva:linux:2006

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Patch Publication Date: 3/22/2006

Reference Information

CVE: CVE-2005-2709, CVE-2005-3044, CVE-2005-3359, CVE-2006-0457, CVE-2006-0554, CVE-2006-0555, CVE-2006-0557, CVE-2006-0741, CVE-2006-0742

MDKSA: 2006:059