This script is Copyright (C) 2012-2013 Tenable Network Security, Inc.
The remote Scientific Linux host is missing one or more security
CVE-2009-2692 kernel: uninit op in SOCKOPS_WRAP() leads to privesc
CVE-2009-2698 kernel: udp socket NULL ptr dereference
These updated packages fix the following security issues :
- a flaw was found in the SOCKOPS_WRAP macro in the Linux
kernel. This macro did not initialize the sendpage
operation in the proto_ops structure correctly. A local,
unprivileged user could use this flaw to cause a local
denial of service or escalate their privileges.
- a flaw was found in the udp_sendmsg() implementation in
the Linux kernel when using the MSG_MORE flag on UDP
sockets. A local, unprivileged user could use this flaw
to cause a local denial of service or escalate their
privileges. (CVE-2009-2698, Important)
These updated packages also fix the following bug :
- in the dlm code, a socket was allocated in
tcp_connect_to_sock(), but was not freed in the error
exit path. This bug led to a memory leak and an
unresponsive system. A reported case of this bug
occurred after running 'cman_tool kill -n [nodename]'.
The system must be rebooted for this update to take effect.
See also :
Update the affected packages.
Risk factor :
High / CVSS Base Score : 7.2
Public Exploit Available : true