RHEL 4 : Updated kernel packages available for Red Hat Enterprise Linux 4 Update 2 (Important) (RHSA-2005:514)

high Nessus Plugin ID 19989

Synopsis

The remote Red Hat host is missing one or more security updates.

Description

The remote Redhat Enterprise Linux 4 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2005:514 advisory.

- security flaw (CVE-2005-0756, CVE-2005-1265, CVE-2005-1761, CVE-2005-1762, CVE-2005-1763, CVE-2005-2098, CVE-2005-2099, CVE-2005-2100, CVE-2005-2456, CVE-2005-2490, CVE-2005-2492, CVE-2005-2555, CVE-2005-2801, CVE-2005-2872, CVE-2005-3105, CVE-2005-3274, CVE-2005-3275, CVE-2006-5871)

- Fix ipv6 exthdr bug causing Oops (CVE-2005-4886)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

http://www.nessus.org/u?aee68d87

https://access.redhat.com/security/updates/classification/#important

https://bugzilla.redhat.com/show_bug.cgi?id=114578

https://bugzilla.redhat.com/show_bug.cgi?id=130914

https://bugzilla.redhat.com/show_bug.cgi?id=134790

https://bugzilla.redhat.com/show_bug.cgi?id=135669

https://bugzilla.redhat.com/show_bug.cgi?id=137343

https://bugzilla.redhat.com/show_bug.cgi?id=140002

https://bugzilla.redhat.com/show_bug.cgi?id=141783

https://bugzilla.redhat.com/show_bug.cgi?id=142989

https://bugzilla.redhat.com/show_bug.cgi?id=144668

https://bugzilla.redhat.com/show_bug.cgi?id=145575

https://bugzilla.redhat.com/show_bug.cgi?id=145648

https://bugzilla.redhat.com/show_bug.cgi?id=145659

https://bugzilla.redhat.com/show_bug.cgi?id=145976

https://bugzilla.redhat.com/show_bug.cgi?id=146187

https://bugzilla.redhat.com/show_bug.cgi?id=147233

https://bugzilla.redhat.com/show_bug.cgi?id=147496

https://bugzilla.redhat.com/show_bug.cgi?id=149478

https://bugzilla.redhat.com/show_bug.cgi?id=149919

https://bugzilla.redhat.com/show_bug.cgi?id=149979

https://bugzilla.redhat.com/show_bug.cgi?id=150152

https://bugzilla.redhat.com/show_bug.cgi?id=151222

https://bugzilla.redhat.com/show_bug.cgi?id=151315

https://bugzilla.redhat.com/show_bug.cgi?id=151323

https://bugzilla.redhat.com/show_bug.cgi?id=151429

https://bugzilla.redhat.com/show_bug.cgi?id=152162

https://bugzilla.redhat.com/show_bug.cgi?id=152440

https://bugzilla.redhat.com/show_bug.cgi?id=152619

https://bugzilla.redhat.com/show_bug.cgi?id=152982

https://bugzilla.redhat.com/show_bug.cgi?id=154055

https://bugzilla.redhat.com/show_bug.cgi?id=154100

https://bugzilla.redhat.com/show_bug.cgi?id=154347

https://bugzilla.redhat.com/show_bug.cgi?id=154435

https://bugzilla.redhat.com/show_bug.cgi?id=154442

https://bugzilla.redhat.com/show_bug.cgi?id=154451

https://bugzilla.redhat.com/show_bug.cgi?id=154733

https://bugzilla.redhat.com/show_bug.cgi?id=155278

https://bugzilla.redhat.com/show_bug.cgi?id=155344

https://bugzilla.redhat.com/show_bug.cgi?id=155354

https://bugzilla.redhat.com/show_bug.cgi?id=155706

https://bugzilla.redhat.com/show_bug.cgi?id=155932

https://bugzilla.redhat.com/show_bug.cgi?id=156010

https://bugzilla.redhat.com/show_bug.cgi?id=156705

https://bugzilla.redhat.com/show_bug.cgi?id=157239

https://bugzilla.redhat.com/show_bug.cgi?id=157725

https://bugzilla.redhat.com/show_bug.cgi?id=157900

https://bugzilla.redhat.com/show_bug.cgi?id=158107

https://bugzilla.redhat.com/show_bug.cgi?id=158293

https://bugzilla.redhat.com/show_bug.cgi?id=158878

https://bugzilla.redhat.com/show_bug.cgi?id=158883

https://bugzilla.redhat.com/show_bug.cgi?id=158930

https://bugzilla.redhat.com/show_bug.cgi?id=158974

https://bugzilla.redhat.com/show_bug.cgi?id=159640

https://bugzilla.redhat.com/show_bug.cgi?id=159671

https://bugzilla.redhat.com/show_bug.cgi?id=159739

https://bugzilla.redhat.com/show_bug.cgi?id=159765

https://bugzilla.redhat.com/show_bug.cgi?id=159918

https://bugzilla.redhat.com/show_bug.cgi?id=159921

https://bugzilla.redhat.com/show_bug.cgi?id=160028

https://bugzilla.redhat.com/show_bug.cgi?id=160117

https://bugzilla.redhat.com/show_bug.cgi?id=160518

https://bugzilla.redhat.com/show_bug.cgi?id=160522

https://bugzilla.redhat.com/show_bug.cgi?id=160524

https://bugzilla.redhat.com/show_bug.cgi?id=160526

https://bugzilla.redhat.com/show_bug.cgi?id=160528

https://bugzilla.redhat.com/show_bug.cgi?id=160547

https://bugzilla.redhat.com/show_bug.cgi?id=160548

https://bugzilla.redhat.com/show_bug.cgi?id=160654

https://bugzilla.redhat.com/show_bug.cgi?id=160663

https://bugzilla.redhat.com/show_bug.cgi?id=160812

https://bugzilla.redhat.com/show_bug.cgi?id=160882

https://bugzilla.redhat.com/show_bug.cgi?id=161143

https://bugzilla.redhat.com/show_bug.cgi?id=161156

https://bugzilla.redhat.com/show_bug.cgi?id=161314

https://bugzilla.redhat.com/show_bug.cgi?id=161789

https://bugzilla.redhat.com/show_bug.cgi?id=161995

https://bugzilla.redhat.com/show_bug.cgi?id=162108

https://bugzilla.redhat.com/show_bug.cgi?id=162257

https://bugzilla.redhat.com/show_bug.cgi?id=162548

https://bugzilla.redhat.com/show_bug.cgi?id=162728

https://bugzilla.redhat.com/show_bug.cgi?id=163528

https://bugzilla.redhat.com/show_bug.cgi?id=164094

https://bugzilla.redhat.com/show_bug.cgi?id=164228

https://bugzilla.redhat.com/show_bug.cgi?id=164338

https://bugzilla.redhat.com/show_bug.cgi?id=164449

https://bugzilla.redhat.com/show_bug.cgi?id=164450

https://bugzilla.redhat.com/show_bug.cgi?id=164628

https://bugzilla.redhat.com/show_bug.cgi?id=164630

https://bugzilla.redhat.com/show_bug.cgi?id=164979

https://bugzilla.redhat.com/show_bug.cgi?id=164991

https://bugzilla.redhat.com/show_bug.cgi?id=165127

https://bugzilla.redhat.com/show_bug.cgi?id=165163

https://bugzilla.redhat.com/show_bug.cgi?id=165242

https://bugzilla.redhat.com/show_bug.cgi?id=165384

https://bugzilla.redhat.com/show_bug.cgi?id=165547

https://bugzilla.redhat.com/show_bug.cgi?id=165560

https://bugzilla.redhat.com/show_bug.cgi?id=165717

https://bugzilla.redhat.com/show_bug.cgi?id=166131

https://bugzilla.redhat.com/show_bug.cgi?id=166248

https://bugzilla.redhat.com/show_bug.cgi?id=166830

https://bugzilla.redhat.com/show_bug.cgi?id=167126

https://bugzilla.redhat.com/show_bug.cgi?id=167412

https://bugzilla.redhat.com/show_bug.cgi?id=167668

https://bugzilla.redhat.com/show_bug.cgi?id=167703

https://bugzilla.redhat.com/show_bug.cgi?id=167711

https://access.redhat.com/errata/RHSA-2005:514

Plugin Details

Severity: High

ID: 19989

File Name: redhat-RHSA-2005-514.nasl

Version: 1.28

Type: local

Agent: unix

Published: 10/11/2005

Updated: 4/27/2024

Supported Sensors: Agentless Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 7.2

Temporal Score: 5.6

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2005-1763

CVSS v3

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.7

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

CVSS Score Source: CVE-2005-2801

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:kernel, p-cpe:/a:redhat:enterprise_linux:kernel-devel, p-cpe:/a:redhat:enterprise_linux:kernel-hugemem, p-cpe:/a:redhat:enterprise_linux:kernel-hugemem-devel, p-cpe:/a:redhat:enterprise_linux:kernel-smp, p-cpe:/a:redhat:enterprise_linux:kernel-smp-devel, cpe:/o:redhat:enterprise_linux:4

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Patch Publication Date: 10/5/2005

Vulnerability Publication Date: 6/8/2005

Reference Information

CVE: CVE-2005-0756, CVE-2005-1265, CVE-2005-1761, CVE-2005-1762, CVE-2005-1763, CVE-2005-2098, CVE-2005-2099, CVE-2005-2100, CVE-2005-2456, CVE-2005-2490, CVE-2005-2492, CVE-2005-2555, CVE-2005-2801, CVE-2005-2872, CVE-2005-3105, CVE-2005-3274, CVE-2005-3275, CVE-2005-4886, CVE-2006-5871

RHSA: 2005:514