This script is Copyright (C) 2009-2015 Tenable Network Security, Inc.
The remote Red Hat host is missing one or more security updates.
Updated kernel packages that fix several security issues and various
bugs are now available for Red Hat Enterprise Linux 4.
This update has been rated as having important security impact by the
Red Hat Security Response Team.
The kernel packages contain the Linux kernel, the core of any Linux
These updated packages fix the following security issues :
* a flaw was found in the Intel PRO/1000 network driver in the Linux
kernel. Frames with sizes near the MTU of an interface may be split
across multiple hardware receive descriptors. Receipt of such a frame
could leak through a validation check, leading to a corruption of the
length check. A remote attacker could use this flaw to send a
specially crafted packet that would cause a denial of service.
* the Linux kernel Network File System daemon (nfsd) implementation
did not drop the CAP_MKNOD capability when handling requests from
local, unprivileged users. This flaw could possibly lead to an
information leak or privilege escalation. (CVE-2009-1072, Moderate)
* Frank Filz reported the NFSv4 client was missing a file permission
check for the execute bit in some situations. This could allow local,
unprivileged users to run non-executable files on NFSv4 mounted file
systems. (CVE-2009-1630, Moderate)
* a missing check was found in the hypervisor_callback() function in
the Linux kernel provided by the kernel-xen package. This could cause
a denial of service of a 32-bit guest if an application running in
that guest accesses a certain memory location in the kernel.
* a flaw was found in the AGPGART driver. The agp_generic_alloc_page()
and agp_generic_alloc_pages() functions did not zero out the memory
pages they allocate, which may later be available to user-space
processes. This flaw could possibly lead to an information leak.
These updated packages also fix the following bugs :
* '/proc/[pid]/maps' and '/proc/[pid]/smaps' can only be read by
processes able to use the ptrace() call on a given process
certain information from '/proc/[pid]/stat' and '/proc/[pid]/wchan'
could be used to reconstruct memory maps, making it possible to bypass
the Address Space Layout Randomization (ASLR) security feature. This
update addresses this issue. (BZ#499549)
* in some situations, the link count was not decreased when renaming
unused files on NFS mounted file systems. This may have resulted in
poor performance. With this update, the link count is decreased in
these situations, the same as is done for other file operations, such
as unlink and rmdir. (BZ#501802)
* tcp_ack() cleared the probes_out variable even if there were
outstanding packets. When low TCP keepalive intervals were used, this
bug may have caused problems, such as connections terminating, when
using remote tools such as rsh and rlogin. (BZ#501754)
* off-by-one errors in the time normalization code could have caused
clock_gettime() to return one billion nanoseconds, rather than adding
an extra second. This bug could have caused the name service cache
daemon (nscd) to consume excessive CPU resources. (BZ#501800)
* a system panic could occur when one thread read
'/proc/bus/input/devices' while another was removing a device. With
this update, a mutex has been added to protect the input_dev_list and
input_handler_list variables, which resolves this issue. (BZ#501804)
* using netdump may have caused a kernel deadlock on some systems.
* the file system mask, which lists capabilities for users with a file
system user ID (fsuid) of 0, was missing the CAP_MKNOD and
CAP_LINUX_IMMUTABLE capabilities. This could, potentially, allow users
with an fsuid other than 0 to perform actions on some file system
types that would otherwise be prevented. This update adds these
All Red Hat Enterprise Linux 4 users should upgrade to these updated
packages, which contain backported patches to resolve these issues.
Note: The system must be rebooted for this update to take effect.
See also :
Update the affected packages.
Risk factor :
High / CVSS Base Score : 7.8
CVSS Temporal Score : 6.8
Public Exploit Available : false
Family: Red Hat Local Security Checks
Nessus Plugin ID: 39583 ()
Bugtraq ID: 3420534673349343495735185
CVE ID: CVE-2009-1072CVE-2009-1192CVE-2009-1385CVE-2009-1630CVE-2009-1758
Upgrade to Nessus Professional today!
Start your free Nessus Cloud trial now!
Begin Free Trial
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.