RHEL 5 : gfs-kmod (RHSA-2010:0521)

Medium Nessus Plugin ID 63938


The remote Red Hat host is missing one or more security updates.


Updated gfs-kmod packages that fix one security issue are now available for Red Hat Enterprise Linux 5.4 Extended Update Support, kernel release 2.6.18-164.19.1.el5.

The Red Hat Security Response Team has rated this update as having moderate security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section.

The gfs-kmod packages contain modules that provide the ability to mount and use GFS file systems.

A flaw was found in the gfs_lock() implementation. The GFS locking code could skip the lock operation for files that have the S_ISGID bit (set-group-ID on execution) in their mode set. A local, unprivileged user on a system that has a GFS file system mounted could use this flaw to cause a kernel panic. (CVE-2010-0727)

These updated gfs-kmod packages are in sync with the latest kernel (2.6.18-164.19.1.el5). The modules in earlier gfs-kmod packages failed to load because they did not match the running kernel. It was possible to force-load the modules. With this update, however, users no longer need to.

Users are advised to upgrade to these latest gfs-kmod packages, updated for use with the 2.6.18-164.19.1.el5 kernel, which contain a backported patch to correct this issue.


Update the affected kmod-gfs, kmod-gfs-PAE and / or kmod-gfs-xen packages.

See Also



Plugin Details

Severity: Medium

ID: 63938

File Name: redhat-RHSA-2010-0521.nasl

Version: $Revision: 1.6 $

Type: local

Agent: unix

Published: 2013/01/24

Modified: 2014/05/02

Dependencies: 12634

Risk Information

Risk Factor: Medium


Base Score: 4.7

Temporal Score: 3.5

Vector: CVSS2#AV:L/AC:M/Au:N/C:N/I:N/A:C

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:kmod-gfs, p-cpe:/a:redhat:enterprise_linux:kmod-gfs-PAE, p-cpe:/a:redhat:enterprise_linux:kmod-gfs-xen, cpe:/o:redhat:enterprise_linux:5.4

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2010/07/08

Reference Information

CVE: CVE-2010-0727

BID: 39101

RHSA: 2010:0521