Executive Summary

Summary
Title Red Hat Enterprise Linux 5.4 kernel security and bug fix update
Informations
Name RHSA-2009:1243 First vendor Publication 2009-09-02
Vendor RedHat Last vendor Modification 2009-09-02
Severity (Vendor) Important Revision 02

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:L/AC:L/Au:N/C:N/I:N/A:C)
Cvss Base Score 4.9 Attack Range Local
Cvss Impact Score 6.9 Attack Complexity Low
Cvss Expoit Score 3.9 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Problem Description:

Updated kernel packages that fix security issues, address several hundred bugs and add numerous enhancements are now available as part of the ongoing support and maintenance of Red Hat Enterprise Linux version 5. This is the fourth regular update.

This update has been rated as having important security impact by the Red Hat Security Response Team.

2. Relevant releases/architectures:

Red Hat Enterprise Linux Desktop (v. 5 client) - i386, noarch, x86_64 Red Hat Enterprise Linux (v. 5 server) - i386, ia64, noarch, ppc, s390x, x86_64

3. Description:

The kernel packages contain the Linux kernel, the core of any Linux operating system.

These updated packages fix the following security issues:

* it was discovered that, when executing a new process, the clear_child_tid pointer in the Linux kernel is not cleared. If this pointer points to a writable portion of the memory of the new program, the kernel could corrupt four bytes of memory, possibly leading to a local denial of service or privilege escalation. (CVE-2009-2848, Important)

* a flaw was found in the way the do_sigaltstack() function in the Linux kernel copies the stack_t structure to user-space. On 64-bit machines, this flaw could lead to a four-byte information leak. (CVE-2009-2847, Moderate)

* a flaw was found in the ext4 file system code. A local attacker could use this flaw to cause a denial of service by performing a resize operation on a specially-crafted ext4 file system. (CVE-2009-0745, Low)

* multiple flaws were found in the ext4 file system code. A local attacker could use these flaws to cause a denial of service by mounting a specially-crafted ext4 file system. (CVE-2009-0746, CVE-2009-0747, CVE-2009-0748, Low)

These updated packages also include several hundred bug fixes for and enhancements to the Linux kernel. Space precludes documenting each of these changes in this advisory and users are directed to the Red Hat Enterprise Linux 5.4 Release Notes for information on the most significant of these changes:

http://www.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5.4/html/ Release_Notes/

Also, for details concerning every bug fixed in and every enhancement added to the kernel for this release, see the kernel chapter in the Red Hat Enterprise Linux 5.4 Technical Notes:

http://www.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5.4/html/ Technical_Notes/kernel.html

All Red Hat Enterprise Linux 5 users are advised to install these updated packages, which address these vulnerabilities as well as fixing the bugs and adding the enhancements noted in the Red Hat Enterprise Linux 5.4 Release Notes and Technical Notes. The system must be rebooted for this update to take effect.

4. Solution:

Before applying this update, make sure that all previously-released errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/docs/DOC-11259

5. Bugs fixed (http://bugzilla.redhat.com/):

223947 - raid10_make_request bug: can't convert block across chunks or bigger than 64k.. 233801 - PCI devices disappear in Xen Paravirtual DomU on reboot/reset 240429 - RHEL5 Kernel crash when specifying mem= or highmem= kernel parameter 242696 - Add Filesystem Label to GFS2 244967 - Frequent path failures during I/O on DM multipath devices 290701 - pci: MSI/HT problems with some nvidia bridge chips 396621 - Increase timeout for device connection on boot 427588 - [RHEL 5.2]: Tick divider bug when using clocksource=pit 436791 - Kernel BUG at drivers/scsi/iscsi_tcp.c:387 - invalid opcode: 0000 439898 - module load option to enable entropy generation from e1000,bnx2 network cards 443541 - Online resize2fs error: Invalid argument While trying to add group #15625 445433 - A deadlock can occur between mmap/munmap and journaling(ext3). 446086 - crash formatting a DVD under libata 448115 - Guest crash when host has >= 64G RAM 448588 - RFE: improve gettimeofday performance on hypervisors 448929 - [RHEL5 U1] Kernel NFS Connectathon Test#12, 12.1 Failing 449175 - E1000 driver enables TSOv6 for hardware that doesn't support it 449346 - SMP 32bit RHEL5u1 and RHEL5u2 HVM domain might stop booting when start udev service 450862 - scsi_add_host() returns success even if the work_q was not created 451849 - ptrace(PTRACE_CONT, sig) kills app even if sig is blocked 452120 - lazy umount causes pwd to fail silently (kernel) 452534 - [RFE] Enable raw devices on s390x 454942 - RHEL5.2: ext3 panic in dx_probe 454981 - CPUID driver does not support cpuid.4 and cpuid.0xb instruments 455232 - RHEL5-U2 Installation hangs on p-series--7029, 2078 455678 - DM-multipath marks the surviving path as failed on failbacks 456437 - [RHEL5.2-Z][kernel-xen] powernow identifies the wrong number of processors. 456698 - Module snd-sb16.ko fails to build in a custom kernel. 459397 - Cannot create more than 1024 nfsd threads 459449 - [Qlogic 5.4] qla4xxx: Remove Dead/Unused code from driver 459943 - FEAT: kernel: nf_nat: backport NAT port randomisation [rhel-5.3] 460133 - NFS problem#3 of IT 106473 - 32-bit jiffy wrap around - NFS inode 460218 - GFS2: Hang when shrink_slab calls gfs2_delete_inode 460693 - Xen domU, RAID1, LVM, iscsi target export with blockio bug 461006 - SCSI Hotswap not working with sym53c8xx_2 card in NSN MCP18 system. 461288 - [EMC 5.4 feat] Require kernel support to issue Control I/O to CKD dasd on EMC Symmetrix arrays 461469 - device-mapper changes to support readonly device maps 462248 - Debug Kernel - NMI Watchdog detected LOCKUP 462352 - [RHEL-5.2] e1000e module doesn't implement SIOETHTOOL ETHTOOL_GPERMADDR 462572 - RHEL 5.1 show error msg of "PCI: BIOS Bug: MCFG area at e0000000 is not E820-reserved" during boot 462725 - [RHEL-5.2] replacing routes doesn't emit notifications via netlink 462731 - invalid behaviour of NETKEY / XFRM deleting SPD 462911 - 5.3 beta kernel -115.el breaks the proprietary Nvidia driver 463244 - [PATCH] Removing bond interfaces causes workqueue thread leak 463249 - document netdev_budget 463573 - Patches to improve timekeeping for RHEL kernels running under VMware. 464039 - Timeouts in wait_drive_not_busy with TEAC DV-W28ECW and similar 464500 - RHEL5: memmap=X$Y option doesn't yield new BIOS map 465143 - update CIFS for RHEL5.4 465456 - Kernel panic in auth_rpcgss:__gss_find_upcall 465543 - kernel module is required to enable kernel markers 465781 - MD RAID1 error handler deadlock (raid1d / make_request) 466086 - IPoIB-CM connectivity problem with eHCA adapters 466701 - RFE: an error when mounting the same NFS mount with different SELinux contexts 467698 - xen: 32 bit guest on 64 bit host oops in xen_set_pud() 467782 - unstable time source 468088 - [EMULEX 5.4 bug] scsi messages correlate with silent data corruption, but no i/o errors 468092 - number of lockd socket connections is capped at 80 469130 - Xen live migration may fail due to fragmented memory 469437 - ansi cprng needs to allow for user-provided initial counter values 469707 - specfile changes to allow just building the debug kernel 469848 - [RHEL5.2] nfs_getattr() hangs during heavy write workloads 470035 - xm dmesg printk spam -- Domain attempted WRMSR 00000000000000e8 from 00000016:3d0e9470 to 00000000:00000000 470059 - IPv6 netfilter: output routing rules based on fwmark don't work 470074 - overlapping nfs locks don't work in gfs/dlm 470111 - FIPS certification requires exporting DSA_verify function 470139 - stack usage optimization in link_path_walk() [rhel-5.4] 470202 - Kernel Panic at pci_scan_bus_parented+0xa/0x1f with "acpi=off" or "acpi=ht" options 470459 - The system stall or panic can occur when /proc/<pid>/oom_score is read 470929 - rng header needs to be in kernel-devel 471254 - lockd: fix reference count leaks in async locking case (impacts GFS2) 471281 - crypto: ansi_cprng: get_prng_bytes returning some incorrect data 471565 - Creation of mirrored logical volume with VG extent-size of 1K fails 471800 - Driver for dm9601 doesn't seem to work as advertised 471893 - kernel's inotify subsystem not send notification on inode link count change 471900 - [QLogic 5.4 feat] qla2xxx,qla8xxx - Support production FCoE hardware. 472386 - fips crypto: self-test needed for rfc4309(ccm(aes)) 472426 - missing compat sys_ustat corrupts userspace when sys_ustat called from 32-bit 472523 - AMD: Panic if cpu_khz is incorrect 472547 - [RHEL5.4 FEAT] Update ixgbe to version 2.0.8-k2 and support the 82599 (Niantic) device 472558 - oops in mirror_map (dm-raid1.c) 473504 - kernel panic in tcp_tso_segment() (iptables/netfilter) 473947 - asm-generic/ioctl.h can generate link error undefined __invalid_size_argument_for_IOC 474091 - [Intel 5.4 FEAT] TSC keeps running in C3+ 474240 - [RHEL5.1] Support of Broadcom HT1100 chipset - add new PCI ID 474301 - [AMD 5.4 FEAT] Withdraw IGN_SERR_INTERNAL for SB800 SATA 474334 - r8169 reports incredible number of RX dropped packets 474394 - crypto: des3_ede single-key doesn't work 474590 - lockd: return NLM_LCK_DENIED_GRACE_PERIOD after long periods 474646 - [LTC 5.4 FEAT] Kernel NSS support - kernel part [200790] 474664 - [LTC 5.4 FEAT] System z support for processor degradation [200975] 474688 - [LTC 5.4 FEAT] Automatic IPL after dump (kernel) [201169] 474699 - After successful connection to a WPA AP, iwlagn loses its ability to speak WEP 474797 - [RHEL 5] gen_estimator deadlock fix 474881 - [Intel 5.4 FEAT] Update the Intel igb driver to match upstream changes & include Kawela PF 474891 - PCI Domain support for HP xw9400 and xw9300 474913 - [LTC 5.4 FEAT] Thread scalability issues with TPC-C [201300] 475145 - audit: increase the maximum length of the key field 475147 - fix assorted audit_filter_task() panics on ctx == NULL 475149 - audit: fix kstrdup() error check 475150 - kernel/audit.c control character detection is off-by-one 475278 - missing audit records for descriptors created by pipe(2) and socketpair(2) 475312 - GFS2: mount attempt hangs if no more journals available 475330 - Misc kernel audit fixups 475334 - [LTC 5.4 FEAT] FCP - Performance Data collection (kernel) [201590] 475374 - Make clock source functions consistent between x86_64 & i386 arches 475530 - [LTC 5.4 FEAT] Extra kernel parameter via VMPARM [201726] 475536 - [LTC 5.4 FEAT] OpenIPMI driver update [201263] 475551 - [LTC 5.4 FEAT] TTY terminal server over IUCV (kernel) [201734] 475563 - [LTC 5.4 FEAT] Shutdown actions interface (kernel) [201747] 475567 - [Broadcom 5.4 FEAT] Update bnx2 to 1.8.2b+ 475570 - [LTC 5.4 FEAT] Provide service levels of HW & Hypervisor in Linux [201753] 475572 - [LTC 5.4 FEAT] HiperSockets Layer3 support for IPv6 [201751] 475620 - [LTC 5.4 FEAT] Update spufs for Cell in the kernel of RHEL5.4 to the upstream version [201774] 475621 - [LTC 5.4 FEAT] Enable SOL (serial over lan) usage for Cell systems with RHEL5 [201454] 475625 - [Intel 5.4 bug] ixgbe does not work reliably with 16 or more cores 475658 - [LTC 5.4 FEAT] Enable Power Button on Cell Blades [201777] 475696 - [LTC 5.4 FEAT] EEH infrastructure change for MSI-X interrupt support [201779] 475717 - [LTC 5.4 FEAT] Enhance the ipr driver to support MSI-X interrupt [201780] 475790 - Compilation failure with /usr/include/linux/futex.h header 475814 - race in aio_complete() leads to process hang 475820 - [LTC 5.4 FEAT] Linux to add Call Home data [201167] 475986 - Question for LUKS device passhprase unreadable when using Xen 476206 - ahci: jmb361 has only one port 476224 - convert NFS to new write_begin/write_end interfaces 476301 - [Chelsio FEAT] Update support for Terminator3 adapters 476626 - GFS2: [RFE] fiemap support for GFS2 476659 - softlockups due to infinite loops in posix_locks_deadlock 476707 - GFS2: [RFE] Merge upstream uevent patches into RHEL 5.4 476897 - kernel panics when attempting to rmmod the bnx2 module while it is in use. 477005 - lockdep warnings on RHEL5.3 xen guest 477012 - network hangs with xen_vnif in FV RHEL5 guest 477206 - [LTC 5.4 FEAT] Xen support for 192 CPUs [201257] 478638 - kernel-2.6.18-92.1.22.el5 misses bug fix which has to be backported. 478643 - multipath test causes memory leak and eventual system deadlock 479200 - [Broadcom 5.4 feat] Please add pcie_set_readrq() to the rhel5_drivers_pci_pcie_ga kernel symbol whitelist 479288 - [QLOGIC 5.4 feat] Add qlge 10Gb ethernet driver 479401 - GFS2: Parsing of remount arguments incorrect 479412 - PATH and EXECVE audit records contain bogus newlines 479740 - [RHEL 5.1] SUN Ultra 40 forcedeth: Network freezes reproducibly (stress) evebe600 479754 - RH5.3 x64 RC2 reboots while installing a virtual machine 479765 - Leap second message can hang the kernel 479927 - Needs to check GSO packet length against MSS 480142 - /proc/acpi/dsdt: No such device 480204 - [QLogic 5.4 bug] qla2xxx - updates and fixes from upstream, part 1 480663 - data corruption and general brokenness with ramdisks (rd) 480696 - RDMA latencytest and perftest fail with QLogic IB 480733 - 2 volume rebuilding problem - second volume rebuild doesn't succeed. 480939 - RHEL-5: Deadlock in Xen netfront driver. 480951 - Improve udp port randomization 481031 - crypto: panic handling ccm vectors with null associated data 481076 - kernel BUG at net/ipv4/netfilter/ip_nat_core.c:308 481175 - need to backport several ansi_cprng patches 481199 - waitpid() reports stopped process more than once 481226 - Bitmap Merging Patch for RHEL 5.4 481283 - [RHEL5.3] Original ether's status is keeping PROMISC MULTICAST mode 481682 - linux-2.6-misc-utrace-update.patch contains incorrect optimization 481691 - [QLogic 5.4 bug] qla2xx - Word-endian problem programming flash on PPC 481715 - BCM5704 NIC results in CPU 100%SI , sluggish system performance 482737 - Add explicit ALUA support to kernel 482796 - eHEA: mutex_unlock missing in eHEA error path 482990 - RHEL 5.3 GA kernel panics when RF Kill is on in 5100/5300 AGN 483171 - Panic at boot if SATA disk is present 483285 - fix oops when using skb_seq_read 483541 - gfs2 blocked after recovery 483588 - [RFE ] Connlimit kernel module support. 483594 - FEAT: RHEL 5.4 - update ALSA HDA audio driver from upstream 483617 - reproducible panic in debugfs_remove when unmounting gfs2 filesystem 483790 - [IPV6] Fix the return value of get destination options with NULL data 483793 - [ipv6] Fix the return value of Set Hop-by-Hop options header with NULL 483814 - kernel BUG at kernel/ptrace.c:1068 484105 - [IPV6] Return correct result for sticky options 484158 - FEAT: feature request. disable iostat collection in gendisk 484227 - [Intel 5.4 FEAT] virtualization feature VTd: hypervisor changes (Xen) 484304 - [RHEL-5.3] ARP packets aren't received by backup slaves breaking arp_validate=3 484403 - Add kernel version to oops and panic output 484590 - Running Openswan ipsec vpn server with rhel-5.3 kernel-2.6.18-128.el5 causes crash 484796 - tulip driver MTU problems when using dot1q vlans 484836 - DASDFMT not operating like CPFMTXA 484943 - [Stratus 5.4 bug] PCI hot unplug can leak MSI descriptors causing fallback to legacy interrupts 484971 - [IPv6] Update setsockopt(IPV6_MULTICAST_IF) to support RFC 3493, try2 484977 - [IPV6]: Check length of optval provided by user in setsockopt() 485098 - NULL pointer deference in gfs2_getbuf 485181 - Dock/Undock+ CDROM support for X61 and other laptops 485182 - Data cards like Huawei EC121 does not work with RHEL5 485226 - GFS2 unaligned access in gfs2_bitfit 485315 - ext4 kernelspace rebase for RHEL5.4 485381 - backport critical netxen driver fixes from upstream kernel to RHEL5.4 485718 - Add mmu-notifiers support to RHEL5 kernel 486030 - [iwl3945] Status LED doesn't light up (Lenovo T61) 486168 - GFS2: Quota mount option inconsistent with common quota/noquota options 486185 - pci_setup_bridge() clears the Prefetchable Memory Base and Limit Upper 32 Bits registers 486204 - [ipv6 RAW] Disallow IPPROTO_IPV6-level IPV6_CHECKSUM socket option on ICMPv6 sockets 486215 - [IPV6] Check outgoing interface even if source address is unspecified 486756 - nfs server rejecting large writes when sec=krb5i/p is specified 487213 - [Intel 5.4 bug] ixgbe driver double counts RX byte count 487293 - Missing DELL MD3000i storage into scsi_dh_rdac kernel module device list 487406 - [ipv6] Check the hop limit setting in ancillary data 487672 - slab corruption with dlm and clvmd on ppc64 487691 - [RHEL5.3]: modprobe xen-vnif in a KVM guest causes a crash 487929 - CVE-2009-0745 kernel: ext4: ext4_group_add() missing initialisation issue 487935 - CVE-2009-0746 kernel: ext4: make_indexed_dir() missing validation 487942 - CVE-2009-0747 kernel: ext4: ext4_isize() denial of service 487945 - CVE-2009-0748 kernel: ext4: ext4_fill_super() missing validation issue 488367 - [NET] Fix functions put_cmsg()/put_cmsg_compat() which may cause usr application memory overflow 488471 - Problem with drive status leds after update to 2.6.18-128.el5 488820 - update efifb 488964 - RHEL 5.4: hpilo - backport of bugfixes and updates from upstream 489096 - install include/trace/*.h headers in kernel-devel 489274 - [RHEL5.3 Xen]: Cannot attach > 16 PV disks using PV-on-HVM drivers 489285 - Backport lookupcache= mount option for nfs shares 489389 - [QLOGIC 5.4 bug] qla4xxx: Extended Sense Data Errors 490078 - "automount" daemon gets blocked uninterruptibly while trying to acquire "i_sem" of monitored directory 490162 - ethttool -S on r8169 version 2.2LK hangs when interface is down 490181 - NFS: an f_mode/f_flags confusion in fs/nfs/write.c 490567 - [RHEL5.3 Xen]: Annoying messages on i686 boot 490938 - [x86_64]: copy_user_c can zero more data than needed 491266 - kernel should be built with -fwrapv [rhel-5.4] 491685 - vmalloc_user() panics 2.6.18-128.1.1.el5 if a kmem cache grows 491775 - building of kernel-devel on i386 doesn't include asm-x86_64/stacktrace.h 492010 - powernow-k8: export module parameters to /sys/modules 492488 - Driver core: make bus_find_device_by_name() more robust 492866 - Xen guest kernel advertises absolute mouse pointer feature which it is incapable of setting up correctly 492911 - tar off gfs2 broken - truncated symbolic links 492943 - GFS2: gfs2_quotad in uninterruptible sleep while idle 492972 - [RHEL5.2] [IPV6] TUNNEL6: Fix incoming packet length check for inter-protocol tunnel. 493045 - memory leak when reading from files mounted with nfs mount option 'noac' 493088 - Kprobes bugfixes backport from 2.6.29 493144 - panic in SELinux code with shrinkable NFS mounts 493152 - [Intel 5.4 FEAT] virtualization feature SR/IOV: kernel changes 493448 - The SCSI tape driver (st) does not support writing with larger buffers when using aic7xxx 493451 - Upgrade to update 3 causes SATA resets. 494114 - 2.6.18-128.1.6.el5xen panic! 494288 - CPU P-state limits (via acpi _ppc) ignored by OS 494658 - With Red Hat errata 128.1.6 installed system hangs with SATA drives installed. 494876 - [RHEL5.4]: Explicitly zero CR[1] in getvcpucontext 494879 - [RHEL5.4]: Fix interaction between dom0 and NTP 494885 - GFS2: gfs2_grow changes to rindex read in wrong by the kernel 495092 - [QLogic 5.4 bug] qla2xxx - updates and fixes from upstream, part 2 495094 - [QLogic 5.4 bug] qla2xxx - updates and fixes from upstream, part 3 495125 - ptrace: wrong value for bp register at syscall entry tracing 495230 - kernel dm: OOps in mempool_free when device removed 495318 - Bonding driver updelay parameter actual behavior doesn't match documented behavior 495442 - vmscan: bail out of direct reclaim after swap_cluster_max pages 495612 - Export guest UUID through SMBIOS to show in guest dmidecode by default 495863 - kernel: tun: Add packet accounting 495866 - show_partition() oops when race with rescan_partitions() 496100 - Random crashing in dm snapshots because of a race condition 496101 - kernel BUG with dm multipath and a partial read request 496102 - Backport patches for snapshot store damage 496126 - [QLogic 5.4 bug] qla2xxx - updates and fixes from upstream, part 4 496338 - sata_mv: Fix chip type for Highpoint RocketRaid 1740/1742 496766 - autofs4 - obvious mistake in mounted check in autofs4_mount_busy() 496869 - [Intel 5.4 FEAT] virtualization feature VTd: kernel changes 496873 - [Intel 5.4 FEAT] virtualization feature enhanced VTd: hypervisor changes 496903 - Setacl not working over NFS. 497411 - kernel BUG at drivers/scsi/libiscsi.c:301! 497414 - add 'success' value to sched_wakeup and sched_wakeup_new tracepoints 497478 - [QLOGIC 5.4 bug] qla4xxx: Driver Fault Recovery 498281 - dont use DID_TRANSPORT_DISRUPTED when transitioning rport or iscsi states 498527 - ehca performance impact during creation of queue pairs 498719 - [patch] mac80211: nullfunc and hidden SSID fixes 499013 - Deadlock between libvirt and xentop 499171 - kernel: ecryptfs_parse_options: eCryptfs: unrecognized option 'ecryptfs_unlink_sigs' 499202 - New compilation warning in ext4 rebase 499289 - RHEL5.3.z LTP nanosleep02 Test Case Failure on Fujitsu Machine 499347 - Add Generic Receive Offload support 499406 - device-mapper: dm-raid45 target doesn't create parity as expected by dmraid (isw) 499541 - kernel: proc: avoid information leaks to non-privileged processes [rhel-5.4] 499776 - kernel: random: make get_random_int() more random [rhel-5.4] 499840 - nfsv4recoverydir proc file unreadable 499870 - Wacom driver with Intuos tablet does not report button press after a proximity leave/re-enter 499999 - ath5k module freezes when interface is brought down 500311 - Kernel panic when loading cpufreq_governor 500368 - NETDEV_BONDING_FAILOVER is defined twice in the kernel 500387 - device-mapper: dm-raid45 target regression causing oops on mapping table reload 500446 - [RHEL5.4] igb: debug kernel reveals incorrect call used to free multiqueue netdev 500568 - kernel-xen should *not* include pci-stub driver 500693 - LTP ftest04 and ftest08 Failures 500729 - Deadlock when a uevent is blocked waiting for the queued I/O. 500745 - Need symbols added to KABI whitelist for cmirror-kmod 500839 - renaming file on a share w/o write permissions causes oops 500857 - [RHEL5 U4] Systems seems to hang on reboot 500892 - Kernel - testing NMI watchdog ... CPU#0: NMI appears to be stuck (0)! 501082 - RHEL5.4 ext4: backport corruption fixes from .30 501178 - RHEL5: NMI lockups seen after enabling cpuspeed on -147.el5 & -148.el5 501308 - REGRESSION: iSCSI Target's Redirect login causes errors in connection 501321 - Removal of directory doesn't produce audit record if rule is recursive 501374 - disable MSI on VIA VT3364 chipsets 501468 - RHEL5.4 virtio: "Device does not have a release() function, it is broken and must be fixed" warnings 501474 - [RHEL5.4 Xen]: Xenbus warnings in a FV guest on shutdown 501475 - [RHEL5.4 Xen]: "Weight assignment" messages printed to the serial console 502944 - READ CAPACITY failed on 10TB LUN 503080 - need to fix sky2 stats 503191 - [RHEL5.4 Xen]: Tun patch causing connectathon to fail 503215 - igb: dropping rx packets 503248 - [Emulex 5.4 bug] Update lpfc to version 8.2.0.44 503309 - qemu-kvm: page allocation failure 503737 - [RHEL5.4 Xen]: Trying to boot a FV -PAE kernel crashes 503818 - Xen dom0 fake e820 prevents IGB driver from creating VF devices 503826 - PCI device fails to allocate resource 503827 - sata_sx4: ata_cmd_set_features time out resulting in disabled device 503905 - kernel: TPM: get_event_name stack corruption [rhel-5.4] 503960 - System freezes when removing ipr driver after injecting EEH errors 504086 - GFS2: s_umount locking bug with gfs2meta filesystem type 504121 - RHEL 5.3 long installation time and low hard disk performance in VX800 platform 504181 - [Broadcom 5.4 bug] Include fixes/cleanups for bnx2i 504676 - gfs2: extending direct IO writes expose stale data (corruption) 504906 - iw_cxgb3 OFED driver update 504955 - RHEL5.4: cxgb3 update 505171 - gfs2: filesystem consistency error with statfs_slow = 1 505445 - [Emulex 5.4 bug] Update lpfc to version 8.2.0.45 (bug fixes only) 505491 - 32-bit Dom0 Cannot Boot in RHEL5.4 505541 - BUG: soft lockup - CPU#0 stuck for 10s! [NetworkManager:5182] 505548 - 1921270 - gfs2 filesystem won't free up space when files are deleted 505601 - ext4 preallocation corruption with truncate 505653 - [RHEL5.4] ixgbe fixups for version 2.0.8-k2 specifically the 82599 506138 - need to backport upstream commit 4ea7e38696c7e798c47ebbecadfd392f23f814f9 from net-next 506140 - GFS2: Filesystem deadlock when running SPECsfs on BIGI test bed. 506151 - RHEL5.4: cxgb3i (open-iscsi) update 506511 - performance regression running Iozone with different I/O options on RHEL54 kernels 506792 - [Emulex 5.4 bug] Update lpfc to version 8.2.0.46 (bug fixes only) 506841 - RHEL5.4 -154 e1000e using MSI-X hangs system 506845 - Kernel panic unplugging a rt73usb dongle 506981 - [QLogic 5.4 bug] qla4xxx: Testing updates, 4 fixes. 507017 - mmap_min_addr can trigger on non MAP_FIXED mmap operations 507246 - [QLogic 5.4 bug] qla2xxx - updates and fixes from upstream, part 5 507398 - [QLogic 5.4 bug] qla2xxx - updates 24xx / 25xx firmware to 4.04.09 507520 - xen kernel, modprobe -r popup call trace and error msg 507620 - [QLogic 5.4 bug] qla2xxx - properly handle event notification in FCoE environment 507932 - [RHEL 5.4] sky2: /proc/net/dev statistics are broken 508297 - RTNL: assertion failed due to bonding notify. 508409 - RHEL 5.4 cxgb3i (open-iscsi) connection error through VLAN 508806 - GFS2 panics while shrinking the glock cache. 508839 - [Emulex 5.4 bug] be2net: traffic stops when using INTx interrupts 508870 - No network traffic when igb network interface receives arp traffic during negotiation 508871 - [Emulex 5.4 bug] Unload of bonding driver causes be2net driver to deadlock 508876 - umount.gfs2 hangs eating CPU 509010 - [Emulex 5.4 bug] Update lpfc to version 8.2.0.48 (bug fixes only) 509207 - VT-d BUG() during normal traffic in ixgbe device 509526 - (RHEL 5.4 Alpha/Beta x86 ) no audio output on IbexPeak chipset 509647 - [QLogic 5.4 bug] qlge - testing fixes part 3. 509818 - cciss: spinlock deadlock causes NMI on HP systems 510008 - [Emulex 5.4 bug] Lower throughput seen on be2net with MSIx interrupt 510268 - qla2xxx - NPIV broken for PPC, endian fix 510665 - megaraid sas driver in rhel5.4-beta fails to scan for SAS tape drive (HP Ultrium 4-SCSI) 510805 - PCI FLR support needed for secure device assignment to KVM guests 511096 - bnx2i and libiscsi: make sure cnic dev is registered and fix libiscsi eh_abort locking 511141 - qla2xxx - Provide fundamental reset capability for EEH 511181 - kernel: build with -fno-delete-null-pointer-checks [rhel-5.4] 512086 - RHEL5.4: Add SATA GEN3 related messages 512266 - [Emulex 5.4 bug] Update lpfc driver to 8.2.0.48.2p to fix multiple panics 512387 - max_phys_segments violation with dm-linear + md raid1 + cciss 513067 - ahci: add device IDs for Ibex Peak SATA AHCI controllers 513070 - cciss disk devices do not have storage capability in HAL 513802 - [Broadcom 5.4 bug] cnic ISCSI_KEVENT_IF_DOWN message handling 514073 - RHEL 5.4 cxgb3i (open-iscsi) hits skb_over_panic() on write 515392 - CVE-2009-2847 kernel: information leak in sigaltstack 515423 - CVE-2009-2848 kernel: execve: must clear current->clear_child_tid

Original Source

Url : https://rhn.redhat.com/errata/RHSA-2009-1243.html

CWE : Common Weakness Enumeration

% Id Name
60 % CWE-20 Improper Input Validation
20 % CWE-399 Resource Management Errors
20 % CWE-269 Improper Privilege Management

OVAL Definitions

Definition Id: oval:org.mitre.oval:def:10342
 
Oval ID: oval:org.mitre.oval:def:10342
Title: The make_indexed_dir function in fs/ext4/namei.c in the Linux kernel 2.6.27 before 2.6.27.19 and 2.6.28 before 2.6.28.7 does not validate a certain rec_len field, which allows local users to cause a denial of service (OOPS) by attempting to mount a crafted ext4 filesystem.
Description: The make_indexed_dir function in fs/ext4/namei.c in the Linux kernel 2.6.27 before 2.6.27.19 and 2.6.28 before 2.6.28.7 does not validate a certain rec_len field, which allows local users to cause a denial of service (OOPS) by attempting to mount a crafted ext4 filesystem.
Family: unix Class: vulnerability
Reference(s): CVE-2009-0746
Version: 5
Platform(s): Red Hat Enterprise Linux 5
CentOS Linux 5
Oracle Linux 5
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:10637
 
Oval ID: oval:org.mitre.oval:def:10637
Title: The do_sigaltstack function in kernel/signal.c in Linux kernel 2.4 through 2.4.37 and 2.6 before 2.6.31-rc5, when running on 64-bit systems, does not clear certain padding bytes from a structure, which allows local users to obtain sensitive information from the kernel stack via the sigaltstack function.
Description: The do_sigaltstack function in kernel/signal.c in Linux kernel 2.4 through 2.4.37 and 2.6 before 2.6.31-rc5, when running on 64-bit systems, does not clear certain padding bytes from a structure, which allows local users to obtain sensitive information from the kernel stack via the sigaltstack function.
Family: unix Class: vulnerability
Reference(s): CVE-2009-2847
Version: 5
Platform(s): Red Hat Enterprise Linux 4
CentOS Linux 4
Oracle Linux 4
Red Hat Enterprise Linux 5
CentOS Linux 5
Oracle Linux 5
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:10683
 
Oval ID: oval:org.mitre.oval:def:10683
Title: The ext4_fill_super function in fs/ext4/super.c in the Linux kernel 2.6.27 before 2.6.27.19 and 2.6.28 before 2.6.28.7 does not validate the superblock configuration, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) by attempting to mount a crafted ext4 filesystem.
Description: The ext4_fill_super function in fs/ext4/super.c in the Linux kernel 2.6.27 before 2.6.27.19 and 2.6.28 before 2.6.28.7 does not validate the superblock configuration, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) by attempting to mount a crafted ext4 filesystem.
Family: unix Class: vulnerability
Reference(s): CVE-2009-0748
Version: 5
Platform(s): Red Hat Enterprise Linux 5
CentOS Linux 5
Oracle Linux 5
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:10942
 
Oval ID: oval:org.mitre.oval:def:10942
Title: The ext4_group_add function in fs/ext4/resize.c in the Linux kernel 2.6.27 before 2.6.27.19 and 2.6.28 before 2.6.28.7 does not properly initialize the group descriptor during a resize (aka resize2fs) operation, which might allow local users to cause a denial of service (OOPS) by arranging for crafted values to be present in available memory.
Description: The ext4_group_add function in fs/ext4/resize.c in the Linux kernel 2.6.27 before 2.6.27.19 and 2.6.28 before 2.6.28.7 does not properly initialize the group descriptor during a resize (aka resize2fs) operation, which might allow local users to cause a denial of service (OOPS) by arranging for crafted values to be present in available memory.
Family: unix Class: vulnerability
Reference(s): CVE-2009-0745
Version: 5
Platform(s): Red Hat Enterprise Linux 5
CentOS Linux 5
Oracle Linux 5
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:11412
 
Oval ID: oval:org.mitre.oval:def:11412
Title: Service Console update for COS kernel
Description: The execve function in the Linux kernel, possibly 2.6.30-rc6 and earlier, does not properly clear the current->clear_child_tid pointer, which allows local users to cause a denial of service (memory corruption) or possibly gain privileges via a clone system call with CLONE_CHILD_SETTID or CLONE_CHILD_CLEARTID enabled, which is not properly handled during thread creation and exit.
Family: unix Class: vulnerability
Reference(s): CVE-2009-2848
Version: 3
Platform(s): VMWare ESX Server 3.5
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:13503
 
Oval ID: oval:org.mitre.oval:def:13503
Title: DSA-1749-1 linux-2.6 -- denial of service/privilege escalation/sensitive memory leak
Description: Several vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or privilege escalation. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2009-0029 Christian Borntraeger discovered an issue effecting the alpha, mips, powerpc, s390 and sparc64 architectures that allows local users to cause a denial of service or potentially gain elevated privileges. CVE-2009-0031 Vegard Nossum discovered a memory leak in the keyctl subsystem that allows local users to cause a denial of service by consuming all of kernel memory. CVE-2009-0065 Wei Yongjun discovered a memory overflow in the SCTP implementation that can be triggered by remote users. CVE-2009-0269 Duane Griffin provided a fix for an issue in the eCryptfs subsystem which allows local users to cause a denial of service. CVE-2009-0322 Pavel Roskin provided a fix for an issue in the dell_rbu driver that allows a local user to cause a denial of service by reading 0 byts from a sysfs entry. CVE-2009-0676 Clement LECIGNE discovered a bug in the sock_getsockopt function that may result in leaking sensitive kernel memory. CVE-2009-0675 Roel Kluin discovered inverted logic in the skfddi driver that permits local, unprivileged users to reset the driver statistics. CVE-2009-0745 Peter Kerwien discovered an issue in the ext4 filesystem that allows local users to cause a denial of service during a resize operation. CVE-2009-0746 Sami Liedes reported an issue in the ext4 filesystem that allows local users to cause a denial of service when accessing a specially crafted corrupt filesystem. CVE-2009-0747 David Maciejak reported an issue in the ext4 filesystem that allows local users to cause a denial of service when mounting a specially crafted corrupt filesystem. CVE-2009-0748 David Maciejak reported an additional issue in the ext4 filesystem that allows local users to cause a denial of service when mounting a specially crafted corrupt filesystem. For the stable distribution, these problems have been fixed in version 2.6.26-13lenny2. For the oldstable distribution, these problems, where applicable, will be fixed in future updates to linux-2.6 and linux-2.6.24. We recommend that you upgrade your linux-2.6 packages.
Family: unix Class: patch
Reference(s): DSA-1749-1
CVE-2009-0029
CVE-2009-0031
CVE-2009-0065
CVE-2009-0269
CVE-2009-0322
CVE-2009-0676
CVE-2009-0675
CVE-2009-0745
CVE-2009-0746
CVE-2009-0747
CVE-2009-0748
Version: 5
Platform(s): Debian GNU/Linux 5.0
Product(s): linux-2.6
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:21973
 
Oval ID: oval:org.mitre.oval:def:21973
Title: ELSA-2009:1243: Oracle Linux 5.x.4 kernel security and bug fix update (Important)
Description: The execve function in the Linux kernel, possibly 2.6.30-rc6 and earlier, does not properly clear the current->clear_child_tid pointer, which allows local users to cause a denial of service (memory corruption) or possibly gain privileges via a clone system call with CLONE_CHILD_SETTID or CLONE_CHILD_CLEARTID enabled, which is not properly handled during thread creation and exit.
Family: unix Class: patch
Reference(s): ELSA-2009:1243-03
CVE-2009-0745
CVE-2009-0746
CVE-2009-0747
CVE-2009-0748
CVE-2009-2847
CVE-2009-2848
Version: 29
Platform(s): Oracle Linux 5
Product(s): kernel
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:29153
 
Oval ID: oval:org.mitre.oval:def:29153
Title: RHSA-2009:1243 -- Red Hat Enterprise Linux 5.4 kernel security and bug fix update (Important)
Description: Updated kernel packages that fix security issues, address several hundred bugs and add numerous enhancements are now available as part of the ongoing support and maintenance of Red Hat Enterprise Linux version 5. This is the fourth regular update. This update has been rated as having important security impact by the Red Hat Security Response Team. The kernel packages contain the Linux kernel, the core of any Linux operating system.
Family: unix Class: patch
Reference(s): RHSA-2009:1243
CESA-2009:1243-CentOS 5
CVE-2009-0745
CVE-2009-0746
CVE-2009-0747
CVE-2009-0748
CVE-2009-2847
CVE-2009-2848
Version: 3
Platform(s): Red Hat Enterprise Linux 5
CentOS Linux 5
Product(s): kernel
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:7765
 
Oval ID: oval:org.mitre.oval:def:7765
Title: VMware kernel ext4_group_add function vulnerability
Description: The ext4_group_add function in fs/ext4/resize.c in the Linux kernel 2.6.27 before 2.6.27.19 and 2.6.28 before 2.6.28.7 does not properly initialize the group descriptor during a resize (aka resize2fs) operation, which might allow local users to cause a denial of service (OOPS) by arranging for crafted values to be present in available memory.
Family: unix Class: vulnerability
Reference(s): CVE-2009-0745
Version: 4
Platform(s): VMWare ESX Server 4.0
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:8039
 
Oval ID: oval:org.mitre.oval:def:8039
Title: VMware kernel make_indexed_dir function vulnerability
Description: The make_indexed_dir function in fs/ext4/namei.c in the Linux kernel 2.6.27 before 2.6.27.19 and 2.6.28 before 2.6.28.7 does not validate a certain rec_len field, which allows local users to cause a denial of service (OOPS) by attempting to mount a crafted ext4 filesystem.
Family: unix Class: vulnerability
Reference(s): CVE-2009-0746
Version: 4
Platform(s): VMWare ESX Server 4.0
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:8381
 
Oval ID: oval:org.mitre.oval:def:8381
Title: DSA-1749 linux-2.6 -- denial of service/privilege escalation/sensitive memory leak
Description: Several vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or privilege escalation. The Common Vulnerabilities and Exposures project identifies the following problems: Christian Borntraeger discovered an issue effecting the alpha, mips, powerpc, s390 and sparc64 architectures that allows local users to cause a denial of service or potentially gain elevated privileges. Vegard Nossum discovered a memory leak in the keyctl subsystem that allows local users to cause a denial of service by consuming all of kernel memory. Wei Yongjun discovered a memory overflow in the SCTP implementation that can be triggered by remote users. Duane Griffin provided a fix for an issue in the eCryptfs subsystem which allows local users to cause a denial of service (fault or memory corruption). Pavel Roskin provided a fix for an issue in the dell_rbu driver that allows a local user to cause a denial of service (oops) by reading 0 bytes from a sysfs entry. Clement LECIGNE discovered a bug in the sock_getsockopt function that may result in leaking sensitive kernel memory. Roel Kluin discovered inverted logic in the skfddi driver that permits local, unprivileged users to reset the driver statistics. Peter Kerwien discovered an issue in the ext4 filesystem that allows local users to cause a denial of service (kernel oops) during a resize operation. Sami Liedes reported an issue in the ext4 filesystem that allows local users to cause a denial of service (kernel oops) when accessing a specially crafted corrupt filesystem. David Maciejak reported an issue in the ext4 filesystem that allows local users to cause a denial of service (kernel oops) when mounting a specially crafted corrupt filesystem. David Maciejak reported an additional issue in the ext4 filesystem that allows local users to cause a denial of service (kernel oops) when mounting a specially crafted corrupt filesystem.
Family: unix Class: patch
Reference(s): DSA-1749
CVE-2009-0029
CVE-2009-0031
CVE-2009-0065
CVE-2009-0269
CVE-2009-0322
CVE-2009-0676
CVE-2009-0675
CVE-2009-0745
CVE-2009-0746
CVE-2009-0747
CVE-2009-0748
Version: 3
Platform(s): Debian GNU/Linux 5.0
Product(s): linux-2.6
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:8405
 
Oval ID: oval:org.mitre.oval:def:8405
Title: VMware kernel do_sigaltstack function vulnerability
Description: The do_sigaltstack function in kernel/signal.c in Linux kernel 2.4 through 2.4.37 and 2.6 before 2.6.31-rc5, when running on 64-bit systems, does not clear certain padding bytes from a structure, which allows local users to obtain sensitive information from the kernel stack via the sigaltstack function.
Family: unix Class: vulnerability
Reference(s): CVE-2009-2847
Version: 4
Platform(s): VMWare ESX Server 4.0
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:8526
 
Oval ID: oval:org.mitre.oval:def:8526
Title: VMware kernel ext4_fill_super function vulnerability
Description: The ext4_fill_super function in fs/ext4/super.c in the Linux kernel 2.6.27 before 2.6.27.19 and 2.6.28 before 2.6.28.7 does not validate the superblock configuration, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) by attempting to mount a crafted ext4 filesystem.
Family: unix Class: vulnerability
Reference(s): CVE-2009-0748
Version: 4
Platform(s): VMWare ESX Server 4.0
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:8585
 
Oval ID: oval:org.mitre.oval:def:8585
Title: VMware kernel ext4_isize function vulnerability
Description: The ext4_isize function in fs/ext4/ext4.h in the Linux kernel 2.6.27 before 2.6.27.19 and 2.6.28 before 2.6.28.7 uses the i_size_high structure member during operations on arbitrary types of files, which allows local users to cause a denial of service (CPU consumption and error-message flood) by attempting to mount a crafted ext4 filesystem.
Family: unix Class: vulnerability
Reference(s): CVE-2009-0747
Version: 4
Platform(s): VMWare ESX Server 4.0
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:8598
 
Oval ID: oval:org.mitre.oval:def:8598
Title: VMware kernel execve function vulnerability
Description: The execve function in the Linux kernel, possibly 2.6.30-rc6 and earlier, does not properly clear the current->clear_child_tid pointer, which allows local users to cause a denial of service (memory corruption) or possibly gain privileges via a clone system call with CLONE_CHILD_SETTID or CLONE_CHILD_CLEARTID enabled, which is not properly handled during thread creation and exit.
Family: unix Class: vulnerability
Reference(s): CVE-2009-2848
Version: 4
Platform(s): VMWare ESX Server 4.0
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:9200
 
Oval ID: oval:org.mitre.oval:def:9200
Title: The ext4_isize function in fs/ext4/ext4.h in the Linux kernel 2.6.27 before 2.6.27.19 and 2.6.28 before 2.6.28.7 uses the i_size_high structure member during operations on arbitrary types of files, which allows local users to cause a denial of service (CPU consumption and error-message flood) by attempting to mount a crafted ext4 filesystem.
Description: The ext4_isize function in fs/ext4/ext4.h in the Linux kernel 2.6.27 before 2.6.27.19 and 2.6.28 before 2.6.28.7 uses the i_size_high structure member during operations on arbitrary types of files, which allows local users to cause a denial of service (CPU consumption and error-message flood) by attempting to mount a crafted ext4 filesystem.
Family: unix Class: vulnerability
Reference(s): CVE-2009-0747
Version: 5
Platform(s): Red Hat Enterprise Linux 5
CentOS Linux 5
Oracle Linux 5
Product(s):
Definition Synopsis:
Definition Id: oval:org.mitre.oval:def:9766
 
Oval ID: oval:org.mitre.oval:def:9766
Title: The execve function in the Linux kernel, possibly 2.6.30-rc6 and earlier, does not properly clear the current-clear_child_tid pointer, which allows local users to cause a denial of service (memory corruption) or possibly gain privileges via a clone system call with CLONE_CHILD_SETTID or CLONE_CHILD_CLEARTID enabled, which is not properly handled during thread creation and exit.
Description: The execve function in the Linux kernel, possibly 2.6.30-rc6 and earlier, does not properly clear the current->clear_child_tid pointer, which allows local users to cause a denial of service (memory corruption) or possibly gain privileges via a clone system call with CLONE_CHILD_SETTID or CLONE_CHILD_CLEARTID enabled, which is not properly handled during thread creation and exit.
Family: unix Class: vulnerability
Reference(s): CVE-2009-2848
Version: 5
Platform(s): Red Hat Enterprise Linux 3
CentOS Linux 3
Red Hat Enterprise Linux 4
CentOS Linux 4
Oracle Linux 4
Red Hat Enterprise Linux 5
CentOS Linux 5
Oracle Linux 5
Product(s):
Definition Synopsis:

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 2
Application 1
Os 4
Os 1
Os 1143
Os 1
Os 1
Os 2
Os 2
Os 2
Os 1
Os 2
Os 1

OpenVAS Exploits

Date Description
2012-07-30 Name : CentOS Update for kernel CESA-2011:0004 centos5 x86_64
File : nvt/gb_CESA-2011_0004_kernel_centos5_x86_64.nasl
2011-08-19 Name : RedHat Update for kernel RHSA-2011:1163-01
File : nvt/gb_RHSA-2011_1163-01_kernel.nasl
2011-08-09 Name : CentOS Update for kernel CESA-2009:1438 centos4 i386
File : nvt/gb_CESA-2009_1438_kernel_centos4_i386.nasl
2011-08-09 Name : CentOS Update for kernel CESA-2009:1243 centos5 i386
File : nvt/gb_CESA-2009_1243_kernel_centos5_i386.nasl
2011-08-09 Name : CentOS Update for kernel CESA-2009:1548 centos5 i386
File : nvt/gb_CESA-2009_1548_kernel_centos5_i386.nasl
2011-08-09 Name : CentOS Update for kernel CESA-2009:1550 centos3 i386
File : nvt/gb_CESA-2009_1550_kernel_centos3_i386.nasl
2011-08-09 Name : CentOS Update for kernel CESA-2010:0046 centos5 i386
File : nvt/gb_CESA-2010_0046_kernel_centos5_i386.nasl
2011-08-09 Name : CentOS Update for kernel CESA-2011:0004 centos5 i386
File : nvt/gb_CESA-2011_0004_kernel_centos5_i386.nasl
2011-01-11 Name : RedHat Update for kernel RHSA-2011:0004-01
File : nvt/gb_RHSA-2011_0004-01_kernel.nasl
2010-03-02 Name : Fedora Update for kernel FEDORA-2010-0919
File : nvt/gb_fedora_2010_0919_kernel_fc11.nasl
2010-03-02 Name : Fedora Update for kernel FEDORA-2010-1500
File : nvt/gb_fedora_2010_1500_kernel_fc11.nasl
2010-03-02 Name : Fedora Update for kernel FEDORA-2010-1804
File : nvt/gb_fedora_2010_1804_kernel_fc11.nasl
2010-02-19 Name : SuSE Update for kernel SUSE-SA:2010:012
File : nvt/gb_suse_2010_012.nasl
2010-01-20 Name : RedHat Update for kernel RHSA-2010:0046-01
File : nvt/gb_RHSA-2010_0046-01_kernel.nasl
2009-12-30 Name : Fedora Core 11 FEDORA-2009-13694 (kernel)
File : nvt/fcore_2009_13694.nasl
2009-12-14 Name : Fedora Core 10 FEDORA-2009-13098 (kernel)
File : nvt/fcore_2009_13098.nasl
2009-12-10 Name : Fedora Core 11 FEDORA-2009-12786 (kernel)
File : nvt/fcore_2009_12786.nasl
2009-11-17 Name : SLES10: Security update for Linux kernel
File : nvt/sles10_kernel9.nasl
2009-11-17 Name : SLES9: Security update for Linux kernel
File : nvt/sles9p5062456.nasl
2009-11-11 Name : Fedora Core 10 FEDORA-2009-11038 (kernel)
File : nvt/fcore_2009_11038.nasl
2009-11-11 Name : Fedora Core 11 FEDORA-2009-11032 (kernel)
File : nvt/fcore_2009_11032.nasl
2009-11-11 Name : Fedora Core 11 FEDORA-2009-10639 (kernel)
File : nvt/fcore_2009_10639.nasl
2009-11-11 Name : Debian Security Advisory DSA 1928-1 (linux-2.6.24)
File : nvt/deb_1928_1.nasl
2009-11-11 Name : CentOS Security Advisory CESA-2009:1550 (kernel)
File : nvt/ovcesa2009_1550.nasl
2009-11-11 Name : RedHat Security Advisory RHSA-2009:1550
File : nvt/RHSA_2009_1550.nasl
2009-10-19 Name : Fedora Core 10 FEDORA-2009-10525 (kernel)
File : nvt/fcore_2009_10525.nasl
2009-10-06 Name : Fedora Core 10 FEDORA-2009-10165 (kernel)
File : nvt/fcore_2009_10165.nasl
2009-09-21 Name : CentOS Security Advisory CESA-2009:1438 (kernel)
File : nvt/ovcesa2009_1438.nasl
2009-09-21 Name : CentOS Security Advisory CESA-2009:1243 (kernel)
File : nvt/ovcesa2009_1243.nasl
2009-09-15 Name : RedHat Security Advisory RHSA-2009:1438
File : nvt/RHSA_2009_1438.nasl
2009-09-09 Name : RedHat Security Advisory RHSA-2009:1239
File : nvt/RHSA_2009_1239.nasl
2009-09-09 Name : RedHat Security Advisory RHSA-2009:1243
File : nvt/RHSA_2009_1243.nasl
2009-09-02 Name : Debian Security Advisory DSA 1872-1 (linux-2.6)
File : nvt/deb_1872_1.nasl
2009-09-02 Name : Fedora Core 11 FEDORA-2009-9044 (kernel)
File : nvt/fcore_2009_9044.nasl
2009-05-05 Name : Debian Security Advisory DSA 1787-1 (linux-2.6.24)
File : nvt/deb_1787_1.nasl
2009-03-31 Name : Debian Security Advisory DSA 1749-1 (linux-2.6)
File : nvt/deb_1749_1.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
57264 Linux Kernel execve Function current->clear_child_tid Pointer Handling Loc...

57208 Linux Kernel 64-bit kernel/signal.c do_sigaltstack() Function Arbitrary Local...

52631 Linux Kernel fs/ext4/resize.c ext4_group_add Function Local DoS

52364 Linux Kernel fs/ext4/ext4.h ext4_isize Crafted ext4 Filesystem Handling Local...

52203 Linux Kernel fs/ext4/super.c ext4_fill_super() Function Ext4 File System Supe...

52202 Linux Kernel fs/ext4/namei.c make_indexed_dir() Function Ext4 File System Han...

Nessus® Vulnerability Scanner

Date Description
2016-03-03 Name : The remote host is missing a security-related patch.
File : vmware_VMSA-2009-0016_remote.nasl - Type : ACT_GATHER_INFO
2014-11-26 Name : The remote OracleVM host is missing one or more security updates.
File : oraclevm_OVMSA-2013-0039.nasl - Type : ACT_GATHER_INFO
2013-07-12 Name : The remote Oracle Linux host is missing one or more security updates.
File : oraclelinux_ELSA-2011-0004.nasl - Type : ACT_GATHER_INFO
2013-07-12 Name : The remote Oracle Linux host is missing one or more security updates.
File : oraclelinux_ELSA-2010-0046.nasl - Type : ACT_GATHER_INFO
2013-07-12 Name : The remote Oracle Linux host is missing one or more security updates.
File : oraclelinux_ELSA-2009-1550.nasl - Type : ACT_GATHER_INFO
2013-07-12 Name : The remote Oracle Linux host is missing one or more security updates.
File : oraclelinux_ELSA-2009-1548.nasl - Type : ACT_GATHER_INFO
2013-07-12 Name : The remote Oracle Linux host is missing one or more security updates.
File : oraclelinux_ELSA-2009-1438.nasl - Type : ACT_GATHER_INFO
2013-06-29 Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2009-1548.nasl - Type : ACT_GATHER_INFO
2013-06-29 Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2009-1550.nasl - Type : ACT_GATHER_INFO
2013-03-06 Name : The remote Scientific Linux host is missing one or more security updates.
File : sl_20091103_kernel_on_SL5_x.nasl - Type : ACT_GATHER_INFO
2013-01-24 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2009-1466.nasl - Type : ACT_GATHER_INFO
2013-01-24 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2011-1163.nasl - Type : ACT_GATHER_INFO
2012-08-01 Name : The remote Scientific Linux host is missing one or more security updates.
File : sl_20091103_kernel_on_SL3_x.nasl - Type : ACT_GATHER_INFO
2012-05-17 Name : The remote SuSE 10 host is missing a security-related patch.
File : suse_kernel-6636.nasl - Type : ACT_GATHER_INFO
2011-01-07 Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2011-0004.nasl - Type : ACT_GATHER_INFO
2011-01-05 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2011-0004.nasl - Type : ACT_GATHER_INFO
2010-06-28 Name : The remote VMware ESX host is missing a security-related patch.
File : vmware_VMSA-2010-0010.nasl - Type : ACT_GATHER_INFO
2010-02-24 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-1928.nasl - Type : ACT_GATHER_INFO
2010-02-24 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-1872.nasl - Type : ACT_GATHER_INFO
2010-02-16 Name : The remote openSUSE host is missing a security update.
File : suse_11_0_kernel-100203.nasl - Type : ACT_GATHER_INFO
2010-01-21 Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2010-0046.nasl - Type : ACT_GATHER_INFO
2010-01-20 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2010-0046.nasl - Type : ACT_GATHER_INFO
2010-01-06 Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2009-1438.nasl - Type : ACT_GATHER_INFO
2010-01-06 Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2009-1243.nasl - Type : ACT_GATHER_INFO
2009-11-23 Name : The remote VMware ESXi / ESX host is missing one or more security-related pat...
File : vmware_VMSA-2009-0016.nasl - Type : ACT_GATHER_INFO
2009-11-16 Name : The remote SuSE 9 host is missing a security-related patch.
File : suse9_12541.nasl - Type : ACT_GATHER_INFO
2009-11-11 Name : The remote SuSE 10 host is missing a security-related patch.
File : suse_kernel-6632.nasl - Type : ACT_GATHER_INFO
2009-11-04 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2009-1550.nasl - Type : ACT_GATHER_INFO
2009-11-04 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2009-1548.nasl - Type : ACT_GATHER_INFO
2009-10-22 Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-852-1.nasl - Type : ACT_GATHER_INFO
2009-10-05 Name : The remote Fedora host is missing a security update.
File : fedora_2009-10165.nasl - Type : ACT_GATHER_INFO
2009-09-16 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2009-1438.nasl - Type : ACT_GATHER_INFO
2009-09-02 Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2009-1243.nasl - Type : ACT_GATHER_INFO
2009-08-27 Name : The remote Fedora host is missing a security update.
File : fedora_2009-9044.nasl - Type : ACT_GATHER_INFO
2009-05-04 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-1787.nasl - Type : ACT_GATHER_INFO
2009-04-23 Name : The remote Ubuntu host is missing one or more security-related patches.
File : ubuntu_USN-751-1.nasl - Type : ACT_GATHER_INFO
2009-03-23 Name : The remote Debian host is missing a security-related update.
File : debian_DSA-1749.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
2
Date Informations
2016-06-28 20:10:00
  • Multiple Updates
2016-04-26 23:17:46
  • Multiple Updates
2014-02-17 11:52:49
  • Multiple Updates