RHEL 5 : gfs-kmod (RHSA-2010:0521)

This script is Copyright (C) 2013-2014 Tenable Network Security, Inc.

Synopsis :

The remote Red Hat host is missing one or more security updates.

Description :

Updated gfs-kmod packages that fix one security issue are now
available for Red Hat Enterprise Linux 5.4 Extended Update Support,
kernel release 2.6.18-164.19.1.el5.

The Red Hat Security Response Team has rated this update as having
moderate security impact. A Common Vulnerability Scoring System (CVSS)
base score, which gives a detailed severity rating, is available from
the CVE link in the References section.

The gfs-kmod packages contain modules that provide the ability to
mount and use GFS file systems.

A flaw was found in the gfs_lock() implementation. The GFS locking
code could skip the lock operation for files that have the S_ISGID bit
(set-group-ID on execution) in their mode set. A local, unprivileged
user on a system that has a GFS file system mounted could use this
flaw to cause a kernel panic. (CVE-2010-0727)

These updated gfs-kmod packages are in sync with the latest kernel
(2.6.18-164.19.1.el5). The modules in earlier gfs-kmod packages failed
to load because they did not match the running kernel. It was possible
to force-load the modules. With this update, however, users no longer
need to.

Users are advised to upgrade to these latest gfs-kmod packages,
updated for use with the 2.6.18-164.19.1.el5 kernel, which contain a
backported patch to correct this issue.

See also :


Solution :

Update the affected kmod-gfs, kmod-gfs-PAE and / or kmod-gfs-xen

Risk factor :

Medium / CVSS Base Score : 4.7
CVSS Temporal Score : 3.5
Public Exploit Available : false

Family: Red Hat Local Security Checks

Nessus Plugin ID: 63938 ()

Bugtraq ID: 39101

CVE ID: CVE-2010-0727

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now