Slackware 9.1 / current : Kernel security update (SSA:2004-049-01)

high Nessus Plugin ID 18789

Synopsis

The remote Slackware host is missing a security update.

Description

New kernels are available for Slackware 9.1 and -current to fix a bounds-checking problem in the kernel's mremap() call which could be used by a local attacker to gain root privileges. Please note that this is not the same issue as CAN-2003-0985 which was fixed in early January. The kernels in Slackware 8.1 and 9.0 that were updated in January are not vulnerable to this new issue because the patch from Solar Designer that was used to fix the CAN-2003-0985 bugs also happened to fix the problem that was discovered later. Sites running Slackware 9.1 or -current should upgrade to a new kernel. After installing the new kernel, be sure to run 'lilo'.

Solution

Update the affected kernel-ide and / or kernel-source packages.

See Also

http://www.nessus.org/u?ebf1ce63

Plugin Details

Severity: High

ID: 18789

File Name: Slackware_SSA_2004-049-01.nasl

Version: 1.21

Type: local

Published: 7/13/2005

Updated: 1/14/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 8.9

CVSS v2

Risk Factor: High

Base Score: 7.2

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: p-cpe:/a:slackware:slackware_linux:kernel-ide, p-cpe:/a:slackware:slackware_linux:kernel-source, cpe:/o:slackware:slackware_linux, cpe:/o:slackware:slackware_linux:9.1

Required KB Items: Host/local_checks_enabled, Host/Slackware/release, Host/Slackware/packages

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2/18/2004

Vulnerability Publication Date: 2/18/2004

Reference Information

CVE: CVE-2004-0077

SSA: 2004-049-01