RHEL 6 : Red Hat Enterprise Linux 6 kernel (RHSA-2012:0862)

medium Nessus Plugin ID 59590

Synopsis

The remote Red Hat host is missing one or more security updates.

Description

The remote Redhat Enterprise Linux 6 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2012:0862 advisory.

The kernel packages contain the Linux kernel, the core of any Linux operating system.

This update fixes the following security issues:

* A flaw was found in the way the Linux kernel's Event Poll (epoll) subsystem handled large, nested epoll structures. A local, unprivileged user could use this flaw to cause a denial of service. (CVE-2011-1083, Moderate)

* A malicious Network File System version 4 (NFSv4) server could return a crafted reply to a GETACL request, causing a denial of service on the client. (CVE-2011-4131, Moderate)

Red Hat would like to thank Nelson Elhage for reporting CVE-2011-1083, and Andy Adamson for reporting CVE-2011-4131.

This update also fixes several hundred bugs and adds enhancements. Refer to the Red Hat Enterprise Linux 6.3 Release Notes for information on the most significant of these changes, and the Technical Notes for further information, both linked to in the References.

All Red Hat Enterprise Linux 6 users are advised to install these updated packages, which correct these issues, and fix the bugs and add the enhancements noted in the Red Hat Enterprise Linux 6.3 Release Notes and Technical Notes. The system must be rebooted for this update to take effect.

Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

http://www.nessus.org/u?085dfcfa

http://www.nessus.org/u?129d9d66

http://www.nessus.org/u?3f38c5a3

https://access.redhat.com/errata/RHSA-2012:0862

https://access.redhat.com/security/updates/classification/#moderate

https://bugzilla.redhat.com/show_bug.cgi?id=542378

https://bugzilla.redhat.com/show_bug.cgi?id=596419

https://bugzilla.redhat.com/show_bug.cgi?id=623913

https://bugzilla.redhat.com/show_bug.cgi?id=624189

https://bugzilla.redhat.com/show_bug.cgi?id=624756

https://bugzilla.redhat.com/show_bug.cgi?id=645365

https://bugzilla.redhat.com/show_bug.cgi?id=681578

https://bugzilla.redhat.com/show_bug.cgi?id=694801

https://bugzilla.redhat.com/show_bug.cgi?id=726369

https://bugzilla.redhat.com/show_bug.cgi?id=727700

https://bugzilla.redhat.com/show_bug.cgi?id=729586

https://bugzilla.redhat.com/show_bug.cgi?id=735105

https://bugzilla.redhat.com/show_bug.cgi?id=738151

https://bugzilla.redhat.com/show_bug.cgi?id=745713

https://bugzilla.redhat.com/show_bug.cgi?id=745775

https://bugzilla.redhat.com/show_bug.cgi?id=745952

https://bugzilla.redhat.com/show_bug.cgi?id=746698

https://bugzilla.redhat.com/show_bug.cgi?id=746929

https://bugzilla.redhat.com/show_bug.cgi?id=747034

https://bugzilla.redhat.com/show_bug.cgi?id=747106

https://bugzilla.redhat.com/show_bug.cgi?id=749117

https://bugzilla.redhat.com/show_bug.cgi?id=752137

https://bugzilla.redhat.com/show_bug.cgi?id=755046

https://bugzilla.redhat.com/show_bug.cgi?id=756307

https://bugzilla.redhat.com/show_bug.cgi?id=757040

https://bugzilla.redhat.com/show_bug.cgi?id=758707

https://bugzilla.redhat.com/show_bug.cgi?id=766554

https://bugzilla.redhat.com/show_bug.cgi?id=767992

https://bugzilla.redhat.com/show_bug.cgi?id=769652

https://bugzilla.redhat.com/show_bug.cgi?id=770250

https://bugzilla.redhat.com/show_bug.cgi?id=772317

https://bugzilla.redhat.com/show_bug.cgi?id=772874

https://bugzilla.redhat.com/show_bug.cgi?id=773219

https://bugzilla.redhat.com/show_bug.cgi?id=773705

https://bugzilla.redhat.com/show_bug.cgi?id=781524

https://bugzilla.redhat.com/show_bug.cgi?id=784351

https://bugzilla.redhat.com/show_bug.cgi?id=784856

https://bugzilla.redhat.com/show_bug.cgi?id=786149

https://bugzilla.redhat.com/show_bug.cgi?id=786610

https://bugzilla.redhat.com/show_bug.cgi?id=786693

https://bugzilla.redhat.com/show_bug.cgi?id=788562

https://bugzilla.redhat.com/show_bug.cgi?id=790418

https://bugzilla.redhat.com/show_bug.cgi?id=790961

https://bugzilla.redhat.com/show_bug.cgi?id=796099

https://bugzilla.redhat.com/show_bug.cgi?id=799075

https://bugzilla.redhat.com/show_bug.cgi?id=800041

https://bugzilla.redhat.com/show_bug.cgi?id=801111

https://bugzilla.redhat.com/show_bug.cgi?id=803132

https://bugzilla.redhat.com/show_bug.cgi?id=803187

https://bugzilla.redhat.com/show_bug.cgi?id=803239

https://bugzilla.redhat.com/show_bug.cgi?id=803620

https://bugzilla.redhat.com/show_bug.cgi?id=807215

https://bugzilla.redhat.com/show_bug.cgi?id=807354

https://bugzilla.redhat.com/show_bug.cgi?id=808571

https://bugzilla.redhat.com/show_bug.cgi?id=809231

https://bugzilla.redhat.com/show_bug.cgi?id=810222

https://bugzilla.redhat.com/show_bug.cgi?id=811669

https://bugzilla.redhat.com/show_bug.cgi?id=812259

https://bugzilla.redhat.com/show_bug.cgi?id=813550

https://bugzilla.redhat.com/show_bug.cgi?id=813678

https://bugzilla.redhat.com/show_bug.cgi?id=813948

https://bugzilla.redhat.com/show_bug.cgi?id=814302

https://bugzilla.redhat.com/show_bug.cgi?id=815785

https://bugzilla.redhat.com/show_bug.cgi?id=816099

https://bugzilla.redhat.com/show_bug.cgi?id=816569

https://bugzilla.redhat.com/show_bug.cgi?id=817236

https://bugzilla.redhat.com/show_bug.cgi?id=818371

https://bugzilla.redhat.com/show_bug.cgi?id=822189

https://bugzilla.redhat.com/show_bug.cgi?id=824287

Plugin Details

Severity: Medium

ID: 59590

File Name: redhat-RHSA-2012-0862.nasl

Version: 1.23

Type: local

Agent: unix

Published: 6/20/2012

Updated: 3/24/2025

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

Vendor

Vendor Severity: Moderate

CVSS v2

Risk Factor: Medium

Base Score: 4.9

Temporal Score: 3.8

Vector: CVSS2#AV:L/AC:L/Au:N/C:N/I:N/A:C

CVSS Score Source: CVE-2011-1083

CVSS v3

Risk Factor: Medium

Base Score: 5.5

Temporal Score: 5

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

CVSS Score Source: CVE-2011-4131

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:kernel, p-cpe:/a:redhat:enterprise_linux:kernel-headers, p-cpe:/a:redhat:enterprise_linux:kernel-firmware, cpe:/o:redhat:enterprise_linux:6, p-cpe:/a:redhat:enterprise_linux:kernel-debug-devel, p-cpe:/a:redhat:enterprise_linux:kernel-kdump, p-cpe:/a:redhat:enterprise_linux:kernel-bootwrapper, p-cpe:/a:redhat:enterprise_linux:python-perf, p-cpe:/a:redhat:enterprise_linux:kernel-kdump-devel, p-cpe:/a:redhat:enterprise_linux:kernel-devel, p-cpe:/a:redhat:enterprise_linux:kernel-debug, p-cpe:/a:redhat:enterprise_linux:perf

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 6/20/2012

Vulnerability Publication Date: 4/4/2011

Reference Information

CVE: CVE-2011-1083, CVE-2011-4131

BID: 46630, 50655

RHSA: 2012:0862