Mandriva Linux Security Advisory : kernel (MDVSA-2008:105)

High Nessus Plugin ID 37772


The remote Mandriva Linux host is missing one or more security updates.


The CIFS filesystem in the Linux kernel before 2.6.22, when Unix extension support is enabled, does not honor the umask of a process, which allows local users to gain privileges. (CVE-2007-3740)

The drm/i915 component in the Linux kernel before, when used with i965G and later chipsets, allows local users with access to an X11 session and Direct Rendering Manager (DRM) to write to arbitrary memory locations and gain privileges via a crafted batchbuffer.

The (1) hugetlb_vmtruncate_list and (2) hugetlb_vmtruncate functions in fs/hugetlbfs/inode.c in the Linux kernel before 2.6.19-rc4 perform certain prio_tree calculations using HPAGE_SIZE instead of PAGE_SIZE units, which allows local users to cause a denial of service (panic) via unspecified vectors. (CVE-2007-4133)

The IA32 system call emulation functionality in Linux kernel 2.4.x and 2.6.x before, when running on the x86_64 architecture, does not zero extend the eax register after the 32bit entry path to ptrace is used, which might allow local users to gain privileges by triggering an out-of-bounds access to the system call table using the %RAX register. This vulnerability is now being fixed in the Xen kernel too. (CVE-2007-4573)

Integer underflow in the ieee80211_rx function in net/ieee80211/ieee80211_rx.c in the Linux kernel 2.6.x before 2.6.23 allows remote attackers to cause a denial of service (crash) via a crafted SKB length value in a runt IEEE 802.11 frame when the IEEE80211_STYPE_QOS_DATA flag is set, aka an off-by-two error.

The disconnect method in the Philips USB Webcam (pwc) driver in Linux kernel 2.6.x before relies on user space to close the device, which allows user-assisted local attackers to cause a denial of service (USB subsystem hang and CPU consumption in khubd) by not closing the device after the disconnect is invoked. NOTE: this rarely crosses privilege boundaries, unless the attacker can convince the victim to unplug the affected device. (CVE-2007-5093)

A race condition in the directory notification subsystem (dnotify) in Linux kernel 2.6.x before, and 2.6.25 before, allows local users to cause a denial of service (OOPS) and possibly gain privileges via unspecified vectors. (CVE-2008-1375)

The Linux kernel before does not apply a certain protection mechanism for fcntl functionality, which allows local users to (1) execute code in parallel or (2) exploit a race condition to obtain re-ordered access to the descriptor table. (CVE-2008-1669)

To update your kernel, please follow the directions located at :


Update the affected packages.

Plugin Details

Severity: High

ID: 37772

File Name: mandriva_MDVSA-2008-105.nasl

Version: $Revision: 1.14 $

Type: local

Published: 2009/04/23

Modified: 2016/11/28

Dependencies: 12634

Risk Information

Risk Factor: High


Base Score: 7.2

Temporal Score: 6.3

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:kernel-, p-cpe:/a:mandriva:linux:kernel-doc-, p-cpe:/a:mandriva:linux:kernel-doc-latest, p-cpe:/a:mandriva:linux:kernel-enterprise-, p-cpe:/a:mandriva:linux:kernel-enterprise-latest, p-cpe:/a:mandriva:linux:kernel-latest, p-cpe:/a:mandriva:linux:kernel-legacy-, p-cpe:/a:mandriva:linux:kernel-legacy-latest, p-cpe:/a:mandriva:linux:kernel-source-, p-cpe:/a:mandriva:linux:kernel-source-latest, p-cpe:/a:mandriva:linux:kernel-source-stripped-, p-cpe:/a:mandriva:linux:kernel-source-stripped-latest, p-cpe:/a:mandriva:linux:kernel-xen0-, p-cpe:/a:mandriva:linux:kernel-xen0-latest, p-cpe:/a:mandriva:linux:kernel-xenU-, p-cpe:/a:mandriva:linux:kernel-xenU-latest, cpe:/o:mandriva:linux:2007.1

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2008/05/21

Reference Information

CVE: CVE-2007-3740, CVE-2007-3851, CVE-2007-4133, CVE-2007-4573, CVE-2007-4997, CVE-2007-5093, CVE-2008-1375, CVE-2008-1669

BID: 25263, 25672, 25774, 26337, 29003, 29076

MDVSA: 2008:105

CWE: 94, 189, 264, 362, 399