Mandriva Linux Security Advisory : kernel (MDVSA-2014:038)

Medium Nessus Plugin ID 72553


The remote Mandriva Linux host is missing one or more security updates.


Multiple vulnerabilities has been found and corrected in the Linux kernel :

The compat_sys_recvmmsg function in net/compat.c in the Linux kernel before 3.13.2, when CONFIG_X86_X32 is enabled, allows local users to gain privileges via a recvmmsg system call with a crafted timeout pointer parameter (CVE-2014-0038).

The restore_fpu_checking function in arch/x86/include/asm/fpu-internal.h in the Linux kernel before 3.12.8 on the AMD K7 and K8 platforms does not clear pending exceptions before proceeding to an EMMS instruction, which allows local users to cause a denial of service (task kill) or possibly gain privileges via a crafted application (CVE-2014-1438).

The yam_ioctl function in drivers/net/hamradio/yam.c in the Linux kernel before 3.12.8 does not initialize a certain structure member, which allows local users to obtain sensitive information from kernel memory by leveraging the CAP_NET_ADMIN capability for an SIOCYAMGCFG ioctl call (CVE-2014-1446).

The updated packages provides a solution for these security issues.


Update the affected packages.

Plugin Details

Severity: Medium

ID: 72553

File Name: mandriva_MDVSA-2014-038.nasl

Version: $Revision: 1.8 $

Type: local

Published: 2014/02/18

Modified: 2016/11/28

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 6.9

Temporal Score: 5.4

Vector: CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:POC/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:cpupower, p-cpe:/a:mandriva:linux:kernel-firmware, p-cpe:/a:mandriva:linux:kernel-headers, p-cpe:/a:mandriva:linux:kernel-server, p-cpe:/a:mandriva:linux:kernel-server-devel, p-cpe:/a:mandriva:linux:kernel-source, p-cpe:/a:mandriva:linux:lib64cpupower-devel, p-cpe:/a:mandriva:linux:lib64cpupower0, p-cpe:/a:mandriva:linux:perf, cpe:/o:mandriva:business_server:1

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2014/02/17

Exploitable With


Core Impact

Metasploit (Linux Kernel 3.13.1 Recvmmsg Privilege Escalation)

Reference Information

CVE: CVE-2014-0038, CVE-2014-1438, CVE-2014-1446

BID: 64781, 64954, 65255

MDVSA: 2014:038