RHEL 4 : Updated kernel packages available for Red Hat Enterprise Linux 4 Update 1 (Important) (RHSA-2005:420)

medium Nessus Plugin ID 18444

Synopsis

The remote Red Hat host is missing one or more security updates.

Description

The remote Redhat Enterprise Linux 4 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2005:420 advisory.

The Linux kernel handles the basic functions of the operating system.

This is the first regular kernel update to Red Hat Enterprise Linux 4.

A flaw affecting the auditing code was discovered. On Itanium architectures a local user could use this flaw to cause a denial of service (crash). This issue is rated as having important security impact (CAN-2005-0136).

A flaw was discovered in the servicing of a raw device ioctl. A local user who has access to raw devices could use this flaw to write to kernel memory and cause a denial of service or potentially gain privileges. This issue is rated as having moderate security impact (CAN-2005-1264).

A flaw in fragment forwarding was discovered that affected the netfilter subsystem for certain network interface cards. A remote attacker could send a set of bad fragments and cause a denial of service (system crash). Acenic and SunGEM network interfaces were the only adapters affected, which are in widespread use. (CAN-2005-0209)

A flaw in the futex functions was discovered affecting the Linux 2.6 kernel. A local user could use this flaw to cause a denial of service (system crash). (CAN-2005-0937)

New features introduced by this update include:
- Fixed TCP BIC congestion handling.
- Diskdump support for more controllers (megaraid, SATA)
- Device mapper multipath support
- AMD64 dual core support.
- Intel ICH7 hardware support.

There were many bug fixes in various parts of the kernel. The ongoing effort to resolve these problems has resulted in a marked improvement in the reliability and scalability of Red Hat Enterprise Linux 4.

The following device drivers have been upgraded to new versions:
ata_piix -------- 1.03 bonding --------- 2.6.1 e1000 ----------- 5.6.10.1-k2-NAPI e100 ------------ 3.3.6-k2-NAPI ibmveth --------- 1.03 libata ---------- 1.02 to 1.10 lpfc ------------ 0:8.0.16 to 0:8.0.16.6_x2 megaraid_mbox --- 2.20.4.0 to 2.20.4.5 megaraid_mm ----- 2.20.2.0-rh1 to 2.20.2.5 sata_nv --------- 0.03 to 0.6 sata_promise ---- 1.00 to 1.01 sata_sil -------- 0.8 sata_sis -------- 0.5 sata_svw -------- 1.05 sata_sx4 -------- 0.7 sata_via -------- 1.0 sata_vsc -------- 1.0 tg3 ------------- 3.22-rh ipw2100 --------- 1.0.3 ipw2200 --------- 1.0.0

All Red Hat Enterprise Linux 4 users are advised to upgrade their kernels to the packages associated with their machine architectures and configurations as listed in this erratum.

Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://bugzilla.redhat.com/show_bug.cgi?id=152557

https://bugzilla.redhat.com/show_bug.cgi?id=154221

https://bugzilla.redhat.com/show_bug.cgi?id=154639

https://bugzilla.redhat.com/show_bug.cgi?id=154972

https://bugzilla.redhat.com/show_bug.cgi?id=155283

https://bugzilla.redhat.com/show_bug.cgi?id=155765

https://bugzilla.redhat.com/show_bug.cgi?id=156875

https://bugzilla.redhat.com/show_bug.cgi?id=157450

https://access.redhat.com/errata/RHSA-2005:420

http://www.nessus.org/u?a4d00f7f

https://access.redhat.com/security/updates/classification/#important

https://bugzilla.redhat.com/show_bug.cgi?id=133590

https://bugzilla.redhat.com/show_bug.cgi?id=134338

https://bugzilla.redhat.com/show_bug.cgi?id=137154

https://bugzilla.redhat.com/show_bug.cgi?id=138563

https://bugzilla.redhat.com/show_bug.cgi?id=140083

https://bugzilla.redhat.com/show_bug.cgi?id=140383

https://bugzilla.redhat.com/show_bug.cgi?id=140472

https://bugzilla.redhat.com/show_bug.cgi?id=141699

https://bugzilla.redhat.com/show_bug.cgi?id=141983

https://bugzilla.redhat.com/show_bug.cgi?id=142167

https://bugzilla.redhat.com/show_bug.cgi?id=142464

https://bugzilla.redhat.com/show_bug.cgi?id=143073

https://bugzilla.redhat.com/show_bug.cgi?id=143472

https://bugzilla.redhat.com/show_bug.cgi?id=143907

https://bugzilla.redhat.com/show_bug.cgi?id=144741

https://bugzilla.redhat.com/show_bug.cgi?id=145424

https://bugzilla.redhat.com/show_bug.cgi?id=146067

https://bugzilla.redhat.com/show_bug.cgi?id=146089

https://bugzilla.redhat.com/show_bug.cgi?id=146703

https://bugzilla.redhat.com/show_bug.cgi?id=146797

https://bugzilla.redhat.com/show_bug.cgi?id=146911

https://bugzilla.redhat.com/show_bug.cgi?id=147832

https://bugzilla.redhat.com/show_bug.cgi?id=150110

https://bugzilla.redhat.com/show_bug.cgi?id=150151

https://bugzilla.redhat.com/show_bug.cgi?id=151284

https://bugzilla.redhat.com/show_bug.cgi?id=152101

https://bugzilla.redhat.com/show_bug.cgi?id=152102

Plugin Details

Severity: Medium

ID: 18444

File Name: redhat-RHSA-2005-420.nasl

Version: 1.30

Type: local

Agent: unix

Published: 6/10/2005

Updated: 11/4/2024

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

Vendor

Vendor Severity: Important

CVSS v2

Risk Factor: High

Base Score: 7.2

Temporal Score: 5.6

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2005-1264

CVSS v3

Risk Factor: Medium

Base Score: 5.5

Temporal Score: 5

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

CVSS Score Source: CVE-2005-3107

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:kernel-smp-devel, p-cpe:/a:redhat:enterprise_linux:kernel, p-cpe:/a:redhat:enterprise_linux:kernel-hugemem-devel, cpe:/o:redhat:enterprise_linux:4, p-cpe:/a:redhat:enterprise_linux:kernel-hugemem, p-cpe:/a:redhat:enterprise_linux:kernel-smp, p-cpe:/a:redhat:enterprise_linux:kernel-devel

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Patch Publication Date: 8/9/2005

Vulnerability Publication Date: 2/22/2005

Reference Information

CVE: CVE-2005-0136, CVE-2005-0209, CVE-2005-0937, CVE-2005-1264, CVE-2005-3107

RHSA: 2005:420