This script is Copyright (C) 2012-2013 Tenable Network Security, Inc.
The remote Scientific Linux host is missing one or more security
CVE-2009-2692 kernel: uninit op in SOCKOPS_WRAP() leads to privesc
CVE-2009-2698 kernel: udp socket NULL ptr dereference
These updated packages fix the following security issues :
- a flaw was found in the SOCKOPS_WRAP macro in the Linux
kernel. This macro did not initialize the sendpage
operation in the proto_ops structure correctly. A local,
unprivileged user could use this flaw to cause a local
denial of service or escalate their privileges.
- a flaw was found in the udp_sendmsg() implementation in
the Linux kernel when using the MSG_MORE flag on UDP
sockets. A local, unprivileged user could use this flaw
to cause a local denial of service or escalate their
privileges. (CVE-2009-2698, Important)
These updated packages also fix the following bug :
- in the dlm code, a socket was allocated in
tcp_connect_to_sock(), but was not freed in the error
exit path. This bug led to a memory leak and an
unresponsive system. A reported case of this bug
occurred after running 'cman_tool kill -n [nodename]'.
The system must be rebooted for this update to take effect.
See also :
Update the affected packages.
Risk factor :
High / CVSS Base Score : 7.2
Public Exploit Available : true
Family: Scientific Linux Local Security Checks
Nessus Plugin ID: 60646 ()
CVE ID: CVE-2009-2692CVE-2009-2698
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.