Scientific Linux Security Update : kernel on SL7.x x86_64

This script is Copyright (C) 2017 Tenable Network Security, Inc.

Synopsis :

The remote Scientific Linux host is missing one or more security

Description :

Security Fix(es) :

- It was found that the packet_set_ring() function of the
Linux kernel's networking implementation did not
properly validate certain block-size data. A local
attacker with CAP_NET_RAW capability could use this flaw
to trigger a buffer overflow, resulting in the crash of
the system. Due to the nature of the flaw, privilege
escalation cannot be fully ruled out. (CVE-2017-7308,

- Mounting a crafted EXT4 image read-only leads to an
attacker controlled memory corruption and
SLAB-Out-of-Bounds reads. (CVE-2016-10208, Moderate)

- A flaw was found in the Linux kernel's implementation of
seq_file where a local attacker could manipulate memory
in the put() function pointer. This could lead to memory
corruption and possible privileged escalation.
(CVE-2016-7910, Moderate)

- A vulnerability was found in the Linux kernel. An
unprivileged local user could trigger oops in
shash_async_export() by attempting to force the
in-kernel hashing algorithms into decrypting an empty
data set. (CVE-2016-8646, Moderate)

- It was reported that with Linux kernel, earlier than
version v4.10-rc8, an application may trigger a BUG_ON
in sctp_wait_for_sndbuf if the socket tx buffer is full,
a thread is waiting on it to queue more data, and
meanwhile another thread peels off the association being
used by the first thread. (CVE-2017-5986, Moderate)

See also :

Solution :

Update the affected packages.

Risk factor :

High / CVSS Base Score : 9.3
Public Exploit Available : true

Family: Scientific Linux Local Security Checks

Nessus Plugin ID: 100458 ()

Bugtraq ID:

CVE ID: CVE-2016-10208

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now