How to Buy
This script is Copyright (C) 2007-2015 Tenable Network Security, Inc.
The remote Red Hat host is missing one or more security updates.
Updated kernel packages that fix various security issues in the Red
Hat Enterprise Linux 5 kernel are now available.
This update has been rated as having important security impact by the
Red Hat Security Response Team.
The Linux kernel handles the basic functions of the operating system.
These new kernel packages contain fixes for the following security
* A flaw was found in the backported stack unwinder fixes in Red Hat
Enterprise Linux 5. On AMD64 and Intel 64 platforms, a local user
could trigger this flaw and cause a denial of service. (CVE-2007-4574,
* A flaw was found in the handling of process death signals. This
allowed a local user to send arbitrary signals to the suid-process
executed by that user. A successful exploitation of this flaw depends
on the structure of the suid-program and its signal handling.
* A flaw was found in the Distributed Lock Manager (DLM) in the
cluster manager. This allowed a remote user who is able to connect to
the DLM port to cause a denial of service. (CVE-2007-3380, Important)
* A flaw was found in the aacraid SCSI driver. This allowed a local
user to make ioctl calls to the driver which should otherwise be
restricted to privileged users. (CVE-2007-4308, Moderate)
* A flaw was found in the prio_tree handling of the hugetlb support
that allowed a local user to cause a denial of service. This only
affected kernels with hugetlb support. (CVE-2007-4133, Moderate)
* A flaw was found in the eHCA driver on PowerPC architectures that
allowed a local user to access 60k of physical address space. This
address space could contain sensitive information. (CVE-2007-3850,
* A flaw was found in ptrace support that allowed a local user to
cause a denial of service via a NULL pointer dereference.
* A flaw was found in the usblcd driver that allowed a local user to
cause a denial of service by writing data to the device node. To
exploit this issue, write access to the device node was needed.
* A flaw was found in the random number generator implementation that
allowed a local user to cause a denial of service or possibly gain
privileges. If the root user raised the default wakeup threshold over
the size of the output pool, this flaw could be exploited.
In addition to the security issues described above, several bug fixes
preventing possible system crashes and data corruption were also
Red Hat Enterprise Linux 5 users are advised to upgrade to these
packages, which contain backported patches to resolve these issues.
See also :
Update the affected packages.
Risk factor :
Medium / CVSS Base Score : 5.0
CVSS Temporal Score : 4.3
Public Exploit Available : false
Family: Red Hat Local Security Checks
Nessus Plugin ID: 27565 ()
Bugtraq ID: 24734252162534825387
CVE ID: CVE-2007-3105CVE-2007-3380CVE-2007-3513CVE-2007-3731CVE-2007-3848CVE-2007-3850CVE-2007-4133CVE-2007-4308CVE-2007-4574
Nessus Professional: Scan unlimited IPs, run compliance checks & moreNessus Cloud: The power of Nessus for teams – from the cloud
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.