RHEL 4 : Red Hat Enterprise Linux 4.9 kernel (RHSA-2011:0263)

medium Nessus Plugin ID 52009

Synopsis

The remote Red Hat host is missing one or more security updates for Red Hat Enterprise Linux 4.9 kernel.

Description

The remote Redhat Enterprise Linux 4 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2011:0263 advisory.

The kernel packages contain the Linux kernel, the core of any Linux operating system.

This update fixes the following security issues:

* A buffer overflow flaw was found in the load_mixer_volumes() function in the Linux kernel's Open Sound System (OSS) sound driver. On 64-bit PowerPC systems, a local, unprivileged user could use this flaw to cause a denial of service or escalate their privileges. (CVE-2010-4527, Important)

* A missing boundary check was found in the dvb_ca_ioctl() function in the Linux kernel's av7110 module. On systems that use old DVB cards that require the av7110 module, a local, unprivileged user could use this flaw to cause a denial of service or escalate their privileges. (CVE-2011-0521, Important)

* A missing initialization flaw was found in the ethtool_get_regs() function in the Linux kernel's ethtool IOCTL handler. A local user who has the CAP_NET_ADMIN capability could use this flaw to cause an information leak. (CVE-2010-4655, Low)

Red Hat would like to thank Dan Rosenberg for reporting CVE-2010-4527, and Kees Cook for reporting CVE-2010-4655.

These updated kernel packages also fix hundreds of bugs and add numerous enhancements. For details on individual bug fixes and enhancements included in this update, refer to the Red Hat Enterprise Linux 4.9 Release Notes, linked to in the References section.

Users should upgrade to these updated packages, which contain backported patches to correct these issues and add these enhancements. The system must be rebooted for this update to take effect.

Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the RHEL Red Hat Enterprise Linux 4.9 kernel package based on the guidance in RHSA-2011:0263.

See Also

https://bugzilla.redhat.com/show_bug.cgi?id=594633

https://bugzilla.redhat.com/show_bug.cgi?id=604786

https://bugzilla.redhat.com/show_bug.cgi?id=605455

https://bugzilla.redhat.com/show_bug.cgi?id=607261

https://bugzilla.redhat.com/show_bug.cgi?id=607533

https://bugzilla.redhat.com/show_bug.cgi?id=610236

https://bugzilla.redhat.com/show_bug.cgi?id=614559

https://bugzilla.redhat.com/show_bug.cgi?id=620485

https://bugzilla.redhat.com/show_bug.cgi?id=621209

https://bugzilla.redhat.com/show_bug.cgi?id=623265

https://bugzilla.redhat.com/show_bug.cgi?id=624117

https://bugzilla.redhat.com/show_bug.cgi?id=624713

https://bugzilla.redhat.com/show_bug.cgi?id=629143

https://bugzilla.redhat.com/show_bug.cgi?id=630564

https://bugzilla.redhat.com/show_bug.cgi?id=634632

https://bugzilla.redhat.com/show_bug.cgi?id=637556

https://bugzilla.redhat.com/show_bug.cgi?id=637658

https://bugzilla.redhat.com/show_bug.cgi?id=640803

https://bugzilla.redhat.com/show_bug.cgi?id=641112

https://bugzilla.redhat.com/show_bug.cgi?id=643992

https://bugzilla.redhat.com/show_bug.cgi?id=645220

https://bugzilla.redhat.com/show_bug.cgi?id=645633

https://bugzilla.redhat.com/show_bug.cgi?id=647187

https://bugzilla.redhat.com/show_bug.cgi?id=647196

https://bugzilla.redhat.com/show_bug.cgi?id=651334

https://bugzilla.redhat.com/show_bug.cgi?id=653252

https://bugzilla.redhat.com/show_bug.cgi?id=653505

https://bugzilla.redhat.com/show_bug.cgi?id=658824

https://bugzilla.redhat.com/show_bug.cgi?id=662839

https://bugzilla.redhat.com/show_bug.cgi?id=667615

https://bugzilla.redhat.com/show_bug.cgi?id=672398

https://bugzilla.redhat.com/show_bug.cgi?id=672428

http://www.nessus.org/u?a8743550

http://www.nessus.org/u?e97e08a9

https://access.redhat.com/errata/RHSA-2011:0263

https://access.redhat.com/security/updates/classification/#important

https://bugzilla.redhat.com/show_bug.cgi?id=176848

https://bugzilla.redhat.com/show_bug.cgi?id=189918

https://bugzilla.redhat.com/show_bug.cgi?id=217829

https://bugzilla.redhat.com/show_bug.cgi?id=247116

https://bugzilla.redhat.com/show_bug.cgi?id=396631

https://bugzilla.redhat.com/show_bug.cgi?id=427998

https://bugzilla.redhat.com/show_bug.cgi?id=445957

https://bugzilla.redhat.com/show_bug.cgi?id=456047

https://bugzilla.redhat.com/show_bug.cgi?id=456649

https://bugzilla.redhat.com/show_bug.cgi?id=457519

https://bugzilla.redhat.com/show_bug.cgi?id=459466

https://bugzilla.redhat.com/show_bug.cgi?id=459499

https://bugzilla.redhat.com/show_bug.cgi?id=461038

https://bugzilla.redhat.com/show_bug.cgi?id=462717

https://bugzilla.redhat.com/show_bug.cgi?id=472752

https://bugzilla.redhat.com/show_bug.cgi?id=476700

https://bugzilla.redhat.com/show_bug.cgi?id=479090

https://bugzilla.redhat.com/show_bug.cgi?id=479264

https://bugzilla.redhat.com/show_bug.cgi?id=480404

https://bugzilla.redhat.com/show_bug.cgi?id=480937

https://bugzilla.redhat.com/show_bug.cgi?id=481292

https://bugzilla.redhat.com/show_bug.cgi?id=481371

https://bugzilla.redhat.com/show_bug.cgi?id=483783

https://bugzilla.redhat.com/show_bug.cgi?id=484415

https://bugzilla.redhat.com/show_bug.cgi?id=485904

https://bugzilla.redhat.com/show_bug.cgi?id=488931

https://bugzilla.redhat.com/show_bug.cgi?id=490148

https://bugzilla.redhat.com/show_bug.cgi?id=491284

https://bugzilla.redhat.com/show_bug.cgi?id=492868

https://bugzilla.redhat.com/show_bug.cgi?id=493780

https://bugzilla.redhat.com/show_bug.cgi?id=494404

https://bugzilla.redhat.com/show_bug.cgi?id=494688

https://bugzilla.redhat.com/show_bug.cgi?id=495858

https://bugzilla.redhat.com/show_bug.cgi?id=496201

https://bugzilla.redhat.com/show_bug.cgi?id=496205

https://bugzilla.redhat.com/show_bug.cgi?id=496206

https://bugzilla.redhat.com/show_bug.cgi?id=496209

https://bugzilla.redhat.com/show_bug.cgi?id=498012

https://bugzilla.redhat.com/show_bug.cgi?id=499355

https://bugzilla.redhat.com/show_bug.cgi?id=499548

https://bugzilla.redhat.com/show_bug.cgi?id=499848

https://bugzilla.redhat.com/show_bug.cgi?id=500637

https://bugzilla.redhat.com/show_bug.cgi?id=500889

https://bugzilla.redhat.com/show_bug.cgi?id=500904

https://bugzilla.redhat.com/show_bug.cgi?id=501064

https://bugzilla.redhat.com/show_bug.cgi?id=501335

https://bugzilla.redhat.com/show_bug.cgi?id=501500

https://bugzilla.redhat.com/show_bug.cgi?id=501844

https://bugzilla.redhat.com/show_bug.cgi?id=502473

https://bugzilla.redhat.com/show_bug.cgi?id=502884

https://bugzilla.redhat.com/show_bug.cgi?id=503489

https://bugzilla.redhat.com/show_bug.cgi?id=503762

https://bugzilla.redhat.com/show_bug.cgi?id=504080

https://bugzilla.redhat.com/show_bug.cgi?id=504156

https://bugzilla.redhat.com/show_bug.cgi?id=504279

https://bugzilla.redhat.com/show_bug.cgi?id=504593

https://bugzilla.redhat.com/show_bug.cgi?id=504778

https://bugzilla.redhat.com/show_bug.cgi?id=504988

https://bugzilla.redhat.com/show_bug.cgi?id=505081

https://bugzilla.redhat.com/show_bug.cgi?id=505122

https://bugzilla.redhat.com/show_bug.cgi?id=505506

https://bugzilla.redhat.com/show_bug.cgi?id=505591

https://bugzilla.redhat.com/show_bug.cgi?id=506875

https://bugzilla.redhat.com/show_bug.cgi?id=507527

https://bugzilla.redhat.com/show_bug.cgi?id=507847

https://bugzilla.redhat.com/show_bug.cgi?id=507951

https://bugzilla.redhat.com/show_bug.cgi?id=509220

https://bugzilla.redhat.com/show_bug.cgi?id=509627

https://bugzilla.redhat.com/show_bug.cgi?id=509816

https://bugzilla.redhat.com/show_bug.cgi?id=510184

https://bugzilla.redhat.com/show_bug.cgi?id=510395

https://bugzilla.redhat.com/show_bug.cgi?id=510454

https://bugzilla.redhat.com/show_bug.cgi?id=511183

https://bugzilla.redhat.com/show_bug.cgi?id=512641

https://bugzilla.redhat.com/show_bug.cgi?id=514684

https://bugzilla.redhat.com/show_bug.cgi?id=515274

https://bugzilla.redhat.com/show_bug.cgi?id=516076

https://bugzilla.redhat.com/show_bug.cgi?id=516742

https://bugzilla.redhat.com/show_bug.cgi?id=517162

https://bugzilla.redhat.com/show_bug.cgi?id=517329

https://bugzilla.redhat.com/show_bug.cgi?id=517523

https://bugzilla.redhat.com/show_bug.cgi?id=520018

https://bugzilla.redhat.com/show_bug.cgi?id=520299

https://bugzilla.redhat.com/show_bug.cgi?id=522000

https://bugzilla.redhat.com/show_bug.cgi?id=523983

https://bugzilla.redhat.com/show_bug.cgi?id=524884

https://bugzilla.redhat.com/show_bug.cgi?id=525398

https://bugzilla.redhat.com/show_bug.cgi?id=525941

https://bugzilla.redhat.com/show_bug.cgi?id=527656

https://bugzilla.redhat.com/show_bug.cgi?id=528066

https://bugzilla.redhat.com/show_bug.cgi?id=529063

https://bugzilla.redhat.com/show_bug.cgi?id=531914

https://bugzilla.redhat.com/show_bug.cgi?id=532045

https://bugzilla.redhat.com/show_bug.cgi?id=532593

https://bugzilla.redhat.com/show_bug.cgi?id=532858

https://bugzilla.redhat.com/show_bug.cgi?id=533299

https://bugzilla.redhat.com/show_bug.cgi?id=537475

https://bugzilla.redhat.com/show_bug.cgi?id=539506

https://bugzilla.redhat.com/show_bug.cgi?id=541538

https://bugzilla.redhat.com/show_bug.cgi?id=543823

https://bugzilla.redhat.com/show_bug.cgi?id=546251

https://bugzilla.redhat.com/show_bug.cgi?id=546324

https://bugzilla.redhat.com/show_bug.cgi?id=547213

https://bugzilla.redhat.com/show_bug.cgi?id=548496

https://bugzilla.redhat.com/show_bug.cgi?id=552953

https://bugzilla.redhat.com/show_bug.cgi?id=557122

https://bugzilla.redhat.com/show_bug.cgi?id=557380

https://bugzilla.redhat.com/show_bug.cgi?id=558607

https://bugzilla.redhat.com/show_bug.cgi?id=561108

https://bugzilla.redhat.com/show_bug.cgi?id=562949

https://bugzilla.redhat.com/show_bug.cgi?id=563920

https://bugzilla.redhat.com/show_bug.cgi?id=568271

https://bugzilla.redhat.com/show_bug.cgi?id=569668

https://bugzilla.redhat.com/show_bug.cgi?id=577178

https://bugzilla.redhat.com/show_bug.cgi?id=577378

https://bugzilla.redhat.com/show_bug.cgi?id=585430

https://bugzilla.redhat.com/show_bug.cgi?id=589897

https://bugzilla.redhat.com/show_bug.cgi?id=591938

Plugin Details

Severity: Medium

ID: 52009

File Name: redhat-RHSA-2011-0263.nasl

Version: 1.21

Type: local

Agent: unix

Published: 2/17/2011

Updated: 3/20/2025

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

Vendor

Vendor Severity: Important

CVSS v2

Risk Factor: High

Base Score: 7.2

Temporal Score: 5.6

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2011-0521

CVSS v3

Risk Factor: Medium

Base Score: 5.5

Temporal Score: 5

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

CVSS Score Source: CVE-2010-4655

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:kernel-smp-devel, p-cpe:/a:redhat:enterprise_linux:kernel, p-cpe:/a:redhat:enterprise_linux:kernel-hugemem-devel, cpe:/o:redhat:enterprise_linux:4, p-cpe:/a:redhat:enterprise_linux:kernel-largesmp-devel, p-cpe:/a:redhat:enterprise_linux:kernel-xenu, p-cpe:/a:redhat:enterprise_linux:kernel-largesmp, p-cpe:/a:redhat:enterprise_linux:kernel-hugemem, p-cpe:/a:redhat:enterprise_linux:kernel-smp, p-cpe:/a:redhat:enterprise_linux:kernel-devel, p-cpe:/a:redhat:enterprise_linux:kernel-xenu-devel

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Ease: No known exploits are available

Patch Publication Date: 2/16/2011

Vulnerability Publication Date: 1/13/2011

Reference Information

CVE: CVE-2010-4527, CVE-2010-4655, CVE-2011-0521

BID: 45629, 45972, 45986

RHSA: 2011:0263