RHEL 4 : Updated kernel packages available for Red Hat Enterprise Linux 4 Update 3 (Moderate) (RHSA-2006:0132)

medium Nessus Plugin ID 21033

Synopsis

The remote Red Hat host is missing a security update.

Description

The remote Redhat Enterprise Linux 4 host has packages installed that are affected by a vulnerability as referenced in the RHSA-2006:0132 advisory.

The Linux kernel handles the basic functions of the operating system.

This is the third regular kernel update to Red Hat Enterprise Linux 4.

New features introduced in this update include:

- Open InfiniBand (OpenIB) support

- Serial Attached SCSI support

- NFS access control lists, asynchronous I/O

- IA64 multi-core support and sgi updates

- Large SMP CPU limits increased using the largesmp kernel: Up to 512 CPUs in ia64, 128 in ppc64, and 64 in AMD64 and Intel EM64T

- Improved read-ahead performance

- Common Internet File System (CIFS) update

- Error Detection and Correction (EDAC) modules

- Unisys support

There were several bug fixes in various parts of the kernel. The ongoing effort to resolve these problems has resulted in a marked improvement in the reliability and scalability of Red Hat Enterprise Linux 4.

The following security bug was fixed in this update:

- dm-crypt did not clear a structure before freeing it, which could allow local users to discover information about cryptographic keys (CVE-2006-0095)

The following device drivers have been upgraded to new versions:

cciss: 2.6.8 to 2.6.8-rh1 ipmi_devintf: 33.4 to 33.11 ipmi_msghandler: 33.4 to 33.11 ipmi_poweroff: 33.4 to 33.11 ipmi_si: 33.4 to 33.11 ipmi_watchdog: 33.4 to 33.11 mptbase: 3.02.18 to 3.02.60.01rh e1000: 6.0.54-k2-NAPI to 6.1.16-k2-NAPI ixgb: 1.0.95-k2-NAPI to 1.0.100-k2-NAPI tg3: 3.27-rh to 3.43-rh aacraid: 1.1.2-lk2 to 1.1-5[2412] ahci: 1.01 to 1.2 ata_piix: 1.03 to 1.05 iscsi_sfnet: 4:0.1.11-1 to 4:0.1.11-2 libata: 1.11 to 1.20 qla2100: 8.01.00b5-rh2 to 8.01.02-d3 qla2200: 8.01.00b5-rh2 to 8.01.02-d3 qla2300: 8.01.00b5-rh2 to 8.01.02-d3 qla2322: 8.01.00b5-rh2 to 8.01.02-d3 qla2xxx: 8.01.00b5-rh2 to 8.01.02-d3 qla6312: 8.01.00b5-rh2 to 8.01.02-d3 sata_nv: 0.6 to 0.8 sata_promise: 1.01 to 1.03 sata_svw: 1.06 to 1.07 sata_sx4: 0.7 to 0.8 sata_vsc: 1.0 to 1.1 cifs: 1.20 to 1.34

Added drivers:

bnx2: 1.4.25 dell_rbu: 0.7 hangcheck-timer: 0.9.0 ib_mthca: 0.06 megaraid_sas: 00.00.02.00 qla2400: 8.01.02-d3 typhoon: 1.5.7

All Red Hat Enterprise Linux 4 users are advised to upgrade their kernels to the packages associated with their machine architectures and configurations as listed in this erratum.

Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

http://www.nessus.org/u?98f66d55

https://access.redhat.com/security/updates/classification/#moderate

https://bugzilla.redhat.com/show_bug.cgi?id=108616

https://bugzilla.redhat.com/show_bug.cgi?id=108827

https://bugzilla.redhat.com/show_bug.cgi?id=131889

https://bugzilla.redhat.com/show_bug.cgi?id=139949

https://bugzilla.redhat.com/show_bug.cgi?id=141699

https://bugzilla.redhat.com/show_bug.cgi?id=141851

https://bugzilla.redhat.com/show_bug.cgi?id=144477

https://bugzilla.redhat.com/show_bug.cgi?id=144703

https://bugzilla.redhat.com/show_bug.cgi?id=145061

https://bugzilla.redhat.com/show_bug.cgi?id=149294

https://bugzilla.redhat.com/show_bug.cgi?id=150893

https://bugzilla.redhat.com/show_bug.cgi?id=151549

https://bugzilla.redhat.com/show_bug.cgi?id=152036

https://bugzilla.redhat.com/show_bug.cgi?id=153971

https://bugzilla.redhat.com/show_bug.cgi?id=154387

https://bugzilla.redhat.com/show_bug.cgi?id=155017

https://bugzilla.redhat.com/show_bug.cgi?id=156437

https://bugzilla.redhat.com/show_bug.cgi?id=156602

https://bugzilla.redhat.com/show_bug.cgi?id=156785

https://bugzilla.redhat.com/show_bug.cgi?id=157241

https://bugzilla.redhat.com/show_bug.cgi?id=157586

https://bugzilla.redhat.com/show_bug.cgi?id=159869

https://bugzilla.redhat.com/show_bug.cgi?id=160308

https://bugzilla.redhat.com/show_bug.cgi?id=160844

https://bugzilla.redhat.com/show_bug.cgi?id=161101

https://bugzilla.redhat.com/show_bug.cgi?id=161362

https://bugzilla.redhat.com/show_bug.cgi?id=161597

https://bugzilla.redhat.com/show_bug.cgi?id=161617

https://bugzilla.redhat.com/show_bug.cgi?id=161846

https://bugzilla.redhat.com/show_bug.cgi?id=162094

https://bugzilla.redhat.com/show_bug.cgi?id=162731

https://bugzilla.redhat.com/show_bug.cgi?id=162732

https://bugzilla.redhat.com/show_bug.cgi?id=162759

https://bugzilla.redhat.com/show_bug.cgi?id=162814

https://bugzilla.redhat.com/show_bug.cgi?id=163150

https://bugzilla.redhat.com/show_bug.cgi?id=163738

https://bugzilla.redhat.com/show_bug.cgi?id=163741

https://bugzilla.redhat.com/show_bug.cgi?id=164298

https://bugzilla.redhat.com/show_bug.cgi?id=164547

https://bugzilla.redhat.com/show_bug.cgi?id=165018

https://bugzilla.redhat.com/show_bug.cgi?id=165092

https://bugzilla.redhat.com/show_bug.cgi?id=165154

https://bugzilla.redhat.com/show_bug.cgi?id=165741

https://bugzilla.redhat.com/show_bug.cgi?id=165744

https://bugzilla.redhat.com/show_bug.cgi?id=165959

https://bugzilla.redhat.com/show_bug.cgi?id=166454

https://bugzilla.redhat.com/show_bug.cgi?id=166524

https://bugzilla.redhat.com/show_bug.cgi?id=166544

https://bugzilla.redhat.com/show_bug.cgi?id=166589

https://bugzilla.redhat.com/show_bug.cgi?id=166880

https://bugzilla.redhat.com/show_bug.cgi?id=167115

https://bugzilla.redhat.com/show_bug.cgi?id=167192

https://bugzilla.redhat.com/show_bug.cgi?id=167211

https://bugzilla.redhat.com/show_bug.cgi?id=167630

https://bugzilla.redhat.com/show_bug.cgi?id=167634

https://bugzilla.redhat.com/show_bug.cgi?id=167645

https://bugzilla.redhat.com/show_bug.cgi?id=167730

https://bugzilla.redhat.com/show_bug.cgi?id=167731

https://bugzilla.redhat.com/show_bug.cgi?id=167907

https://bugzilla.redhat.com/show_bug.cgi?id=168090

https://bugzilla.redhat.com/show_bug.cgi?id=168262

https://bugzilla.redhat.com/show_bug.cgi?id=168431

https://bugzilla.redhat.com/show_bug.cgi?id=168483

https://bugzilla.redhat.com/show_bug.cgi?id=168775

https://bugzilla.redhat.com/show_bug.cgi?id=168824

https://bugzilla.redhat.com/show_bug.cgi?id=169042

https://bugzilla.redhat.com/show_bug.cgi?id=169149

https://bugzilla.redhat.com/show_bug.cgi?id=169184

https://bugzilla.redhat.com/show_bug.cgi?id=169197

https://bugzilla.redhat.com/show_bug.cgi?id=170146

https://bugzilla.redhat.com/show_bug.cgi?id=170423

https://bugzilla.redhat.com/show_bug.cgi?id=170487

https://bugzilla.redhat.com/show_bug.cgi?id=170546

https://bugzilla.redhat.com/show_bug.cgi?id=170656

https://bugzilla.redhat.com/show_bug.cgi?id=170864

https://bugzilla.redhat.com/show_bug.cgi?id=170887

https://bugzilla.redhat.com/show_bug.cgi?id=170985

https://bugzilla.redhat.com/show_bug.cgi?id=171060

https://bugzilla.redhat.com/show_bug.cgi?id=171112

https://bugzilla.redhat.com/show_bug.cgi?id=171141

https://bugzilla.redhat.com/show_bug.cgi?id=171220

https://bugzilla.redhat.com/show_bug.cgi?id=171705

https://bugzilla.redhat.com/show_bug.cgi?id=171715

https://bugzilla.redhat.com/show_bug.cgi?id=171765

https://bugzilla.redhat.com/show_bug.cgi?id=171950

https://bugzilla.redhat.com/show_bug.cgi?id=171985

https://bugzilla.redhat.com/show_bug.cgi?id=171989

https://bugzilla.redhat.com/show_bug.cgi?id=172081

https://bugzilla.redhat.com/show_bug.cgi?id=172214

https://bugzilla.redhat.com/show_bug.cgi?id=172393

https://bugzilla.redhat.com/show_bug.cgi?id=172487

https://bugzilla.redhat.com/show_bug.cgi?id=172595

https://bugzilla.redhat.com/show_bug.cgi?id=172598

https://bugzilla.redhat.com/show_bug.cgi?id=172839

https://bugzilla.redhat.com/show_bug.cgi?id=172892

https://bugzilla.redhat.com/show_bug.cgi?id=172920

https://bugzilla.redhat.com/show_bug.cgi?id=172986

https://bugzilla.redhat.com/show_bug.cgi?id=173155

https://bugzilla.redhat.com/show_bug.cgi?id=173156

https://bugzilla.redhat.com/show_bug.cgi?id=173157

https://bugzilla.redhat.com/show_bug.cgi?id=173158

https://bugzilla.redhat.com/show_bug.cgi?id=173159

https://bugzilla.redhat.com/show_bug.cgi?id=173161

https://bugzilla.redhat.com/show_bug.cgi?id=173163

https://bugzilla.redhat.com/show_bug.cgi?id=173164

https://bugzilla.redhat.com/show_bug.cgi?id=173166

https://bugzilla.redhat.com/show_bug.cgi?id=173174

https://bugzilla.redhat.com/show_bug.cgi?id=173194

https://bugzilla.redhat.com/show_bug.cgi?id=173206

https://bugzilla.redhat.com/show_bug.cgi?id=173304

https://bugzilla.redhat.com/show_bug.cgi?id=173354

https://bugzilla.redhat.com/show_bug.cgi?id=173486

https://bugzilla.redhat.com/show_bug.cgi?id=173493

https://bugzilla.redhat.com/show_bug.cgi?id=173912

https://bugzilla.redhat.com/show_bug.cgi?id=173981

https://bugzilla.redhat.com/show_bug.cgi?id=174427

https://bugzilla.redhat.com/show_bug.cgi?id=174760

https://bugzilla.redhat.com/show_bug.cgi?id=174895

https://bugzilla.redhat.com/show_bug.cgi?id=175123

https://bugzilla.redhat.com/show_bug.cgi?id=175132

https://bugzilla.redhat.com/show_bug.cgi?id=175415

https://bugzilla.redhat.com/show_bug.cgi?id=175680

https://bugzilla.redhat.com/show_bug.cgi?id=175687

https://bugzilla.redhat.com/show_bug.cgi?id=175728

https://bugzilla.redhat.com/show_bug.cgi?id=175812

https://bugzilla.redhat.com/show_bug.cgi?id=175988

https://bugzilla.redhat.com/show_bug.cgi?id=176825

https://bugzilla.redhat.com/show_bug.cgi?id=177031

https://bugzilla.redhat.com/show_bug.cgi?id=177136

https://bugzilla.redhat.com/show_bug.cgi?id=177445

https://bugzilla.redhat.com/show_bug.cgi?id=177492

https://bugzilla.redhat.com/show_bug.cgi?id=177522

https://bugzilla.redhat.com/show_bug.cgi?id=177527

https://bugzilla.redhat.com/show_bug.cgi?id=177561

https://bugzilla.redhat.com/show_bug.cgi?id=177620

https://bugzilla.redhat.com/show_bug.cgi?id=177634

https://bugzilla.redhat.com/show_bug.cgi?id=177719

https://bugzilla.redhat.com/show_bug.cgi?id=178839

https://bugzilla.redhat.com/show_bug.cgi?id=178975

https://bugzilla.redhat.com/show_bug.cgi?id=179057

https://bugzilla.redhat.com/show_bug.cgi?id=179751

https://bugzilla.redhat.com/show_bug.cgi?id=180353

https://bugzilla.redhat.com/show_bug.cgi?id=180405

https://bugzilla.redhat.com/show_bug.cgi?id=181574

https://bugzilla.redhat.com/show_bug.cgi?id=181884

https://access.redhat.com/errata/RHSA-2006:0132

Plugin Details

Severity: Medium

ID: 21033

File Name: redhat-RHSA-2006-0132.nasl

Version: 1.26

Type: local

Agent: unix

Published: 3/8/2006

Updated: 3/21/2025

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

Vendor

Vendor Severity: Moderate

CVSS v2

Risk Factor: Low

Base Score: 2.1

Temporal Score: 1.6

Vector: CVSS2#AV:L/AC:L/Au:N/C:P/I:N/A:N

CVSS Score Source: CVE-2006-0095

CVSS v3

Risk Factor: Medium

Base Score: 5.5

Temporal Score: 4.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:kernel-smp-devel, p-cpe:/a:redhat:enterprise_linux:kernel, p-cpe:/a:redhat:enterprise_linux:kernel-hugemem-devel, cpe:/o:redhat:enterprise_linux:4, p-cpe:/a:redhat:enterprise_linux:kernel-largesmp-devel, p-cpe:/a:redhat:enterprise_linux:kernel-largesmp, p-cpe:/a:redhat:enterprise_linux:kernel-hugemem, p-cpe:/a:redhat:enterprise_linux:kernel-smp, p-cpe:/a:redhat:enterprise_linux:kernel-devel

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Patch Publication Date: 3/7/2006

Vulnerability Publication Date: 1/6/2006

Reference Information

CVE: CVE-2006-0095

RHSA: 2006:0132