Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Mandrake Local Security Checks >> MDKSA-2004:015: kernel


Vulnerability Assessment Details

MDKSA-2004:015: kernel

Vulnerability Assessment Summary
Check for the version of the kernel package

Detailed Explanation for this Vulnerability Assessment

The remote host is missing the patch for the advisory MDKSA-2004:015 (kernel).


Paul Staretz discovered a flaw in return value checking in the mremap() function
in the Linux kernel, versions 2.4.24 and previous that could permit a local user
to obtain root rights.
A vulnerability was found in the R128 DRI driver by Alan Cox. This could permit
local privilege escalation.
A flaw in the ncp_lookup() function in the ncpfs code (which is used to mount
NetWare volumes or print to NetWare printers) was found by Arjen van de Ven that
could permit local privilege escalation.
The Vicam USB driver in Linux kernel versions prior to 2.4.25 does not use the
copy_from_user function to access userspace, which crosses security boundaries.
This problem does not affect the Mandrake Linux 9.2 kernel.
Additionally, a ptrace hole that only affects the amd64/x86_64 platform has been
corrected.
The provided packages are patched to fix these vulnerabilities. All users are
encouraged to upgrade to these updated kernels.
To update your kernel, please follow the directions located at:
http://www.mandrakesecure.net/en/kernelupdate.php


Solution : http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2004:015
Network Security Threat Level: High

Networks Security ID: 9570, 9691

Vulnerability Assessment Copyright: This script is Copyright (C) 2004 Tenable Network Security

Cables, Connectors

NEW HPE P07203-S01 ProLiant MicroServer Gen10 X3418 1P 8GB-U 4LFF NHP 200W PS
$504.98
NEW HPE P07203-S01 ProLiant MicroServer Gen10 X3418 1P 8GB-U 4LFF NHP 200W PS pictureRefurbished HP N36L Microserver 1.3Ghz 1GB 160GB NHP 612275-001
$440.0
Refurbished HP N36L Microserver 1.3Ghz 1GB  160GB NHP 612275-001 pictureSuper Micro Computer CSE-101S Mini-ITX Server Chassis Computer Case
$89.99
Super Micro Computer CSE-101S Mini-ITX Server Chassis Computer Case pictureHP Proliant MicroServer Gen8-Xeon E3 1220L 2.3GHz-16GB-4x 4TB ENT SATA-G8 Server
$1055.88
HP Proliant MicroServer Gen8-Xeon E3 1220L 2.3GHz-16GB-4x 4TB ENT SATA-G8 Server picture


Discussions

No Discussions have been posted on this vulnerability.