RHEL 5 : kernel (RHSA-2011:0927)

medium Nessus Plugin ID 55597

Synopsis

The remote Red Hat host is missing one or more security updates for kernel.

Description

The remote Redhat Enterprise Linux 5 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2011:0927 advisory.

- kernel: IB/uverbs: Handle large number of entries in poll CQ (CVE-2010-4649, CVE-2011-1044)

- kernel: panic in ib_cm:cm_work_handler (CVE-2011-0695)

- kernel: xfs: prevent leaking uninitialized stack memory in FSGEOMETRY_V1 (CVE-2011-0711)

- kernel signal spoofing issue (CVE-2011-1182)

- kernel: sctp: fix to calc the INIT/INIT-ACK chunk length correctly to set (CVE-2011-1573)

- kernel: net: Fix memory leak/corruption on VLAN GRO_DROP (CVE-2011-1576)

- kernel: proc: signedness issue in next_pidmap() (CVE-2011-1593)

- kernel: agp: insufficient pg_start parameter checking in AGPIOC_BIND and AGPIOC_UNBIND ioctls (CVE-2011-1745, CVE-2011-2022)

- kernel: agp: insufficient page_count parameter checking in agp_allocate_memory() (CVE-2011-1746)

- kernel: validate size of EFI GUID partition entries (CVE-2011-1776)

- kernel: xen: vmx: insecure cpuid vmexit (CVE-2011-1936)

- kernel: inet_diag: insufficient validation (CVE-2011-2213)

- kernel: bluetooth: l2cap and rfcomm: fix 1 byte infoleak to userspace (CVE-2011-2492)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the RHEL kernel package based on the guidance in RHSA-2011:0927.

See Also

https://access.redhat.com/security/updates/classification/#important

https://bugzilla.redhat.com/show_bug.cgi?id=653648

https://bugzilla.redhat.com/show_bug.cgi?id=667916

https://bugzilla.redhat.com/show_bug.cgi?id=677260

https://bugzilla.redhat.com/show_bug.cgi?id=690028

https://bugzilla.redhat.com/show_bug.cgi?id=695173

https://bugzilla.redhat.com/show_bug.cgi?id=695383

https://bugzilla.redhat.com/show_bug.cgi?id=697822

https://bugzilla.redhat.com/show_bug.cgi?id=698996

https://bugzilla.redhat.com/show_bug.cgi?id=698998

https://bugzilla.redhat.com/show_bug.cgi?id=703019

https://bugzilla.redhat.com/show_bug.cgi?id=703026

https://bugzilla.redhat.com/show_bug.cgi?id=703056

https://bugzilla.redhat.com/show_bug.cgi?id=706323

https://bugzilla.redhat.com/show_bug.cgi?id=707899

https://bugzilla.redhat.com/show_bug.cgi?id=711519

https://bugzilla.redhat.com/show_bug.cgi?id=714536

http://www.nessus.org/u?2ba3269a

http://www.nessus.org/u?a5cc5305

https://access.redhat.com/errata/RHSA-2011:0927

Plugin Details

Severity: Medium

ID: 55597

File Name: redhat-RHSA-2011-0927.nasl

Version: 1.29

Type: local

Agent: unix

Published: 7/15/2011

Updated: 4/27/2024

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

Vendor

Vendor Severity: Important

CVSS v2

Risk Factor: Medium

Base Score: 6.9

Temporal Score: 6

Vector: CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2011-2022

CVSS v3

Risk Factor: Medium

Base Score: 6.1

Temporal Score: 5.8

Vector: CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H

Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C

CVSS Score Source: CVE-2011-1776

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:kernel-xen-devel, p-cpe:/a:redhat:enterprise_linux:kernel-pae, cpe:/o:redhat:enterprise_linux:5, p-cpe:/a:redhat:enterprise_linux:kernel-headers, p-cpe:/a:redhat:enterprise_linux:kernel-devel, p-cpe:/a:redhat:enterprise_linux:kernel-debug-devel, p-cpe:/a:redhat:enterprise_linux:kernel-pae-devel, p-cpe:/a:redhat:enterprise_linux:kernel-kdump, p-cpe:/a:redhat:enterprise_linux:kernel-kdump-devel, p-cpe:/a:redhat:enterprise_linux:kernel, p-cpe:/a:redhat:enterprise_linux:kernel-debug, p-cpe:/a:redhat:enterprise_linux:kernel-xen

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 7/15/2011

Vulnerability Publication Date: 2/18/2011

Reference Information

CVE: CVE-2010-4649, CVE-2011-0695, CVE-2011-0711, CVE-2011-1044, CVE-2011-1182, CVE-2011-1573, CVE-2011-1576, CVE-2011-1593, CVE-2011-1745, CVE-2011-1746, CVE-2011-1776, CVE-2011-1936, CVE-2011-2022, CVE-2011-2213, CVE-2011-2492

BID: 46073, 46417, 46488, 46839, 47003, 47308, 47497, 47534, 47535, 47796, 47843, 48333, 48441, 48610

CWE: 401

RHSA: 2011:0927