Scientific Linux Security Update : kernel on SL5.x i386/x86_64

This script is Copyright (C) 2012-2016 Tenable Network Security, Inc.

Synopsis :

The remote Scientific Linux host is missing one or more security

Description :

- the Xen implementation did not prevent applications
running in a para-virtualized guest from modifying CR4
TSC. This could cause a local denial of service.
(CVE-2007-5907, Important)

- Tavis Ormandy reported missing boundary checks in the
Virtual Dynamic Shared Objects (vDSO) implementation.
This could allow a local unprivileged user to cause a
denial of service or escalate privileges.
(CVE-2008-3527, Important)

- the do_truncate() and generic_file_splice_write()
functions did not clear the setuid and setgid bits. This
could allow a local unprivileged user to obtain access
to privileged information. (CVE-2008-4210,
CVE-2008-3833, Important)

- a flaw was found in the Linux kernel splice
implementation. This could cause a local denial of
service when there is a certain failure in the
add_to_page_cache_lru() function. (CVE-2008-4302,

- a flaw was found in the Linux kernel when running on
AMD64 systems. During a context switch, EFLAGS were
being neither saved nor restored. This could allow a
local unprivileged user to cause a denial of service.
(CVE-2006-5755, Low)

- a flaw was found in the Linux kernel virtual memory
implementation. This could allow a local unprivileged
user to cause a denial of service. (CVE-2008-2372, Low)

- an integer overflow was discovered in the Linux kernel
Datagram Congestion Control Protocol (DCCP)
implementation. This could allow a remote attacker to
cause a denial of service. By default, remote DCCP is
blocked by SELinux. (CVE-2008-3276, Low)

In addition, these updated packages fix the following bugs :

- random32() seeding has been improved.

- in a multi-core environment, a race between the QP async
event-handler and the destro_qp() function could occur.
This led to unpredictable results during invalid memory
access, which could lead to a kernel crash.

- a format string was omitted in the call to the
request_module() function.

- a stack overflow caused by an infinite recursion bug in
the binfmt_misc kernel module was corrected.

- the ata_scsi_rbuf_get() and ata_scsi_rbuf_put()
functions now check for scatterlist usage before calling

- a sentinel NUL byte was added to the device_write()
function to ensure that is NUL-terminated.

- in the character device driver, a range_is_allowed()
check was added to the read_mem() and write_mem()
functions. It was possible for an illegitimate
application to bypass these checks, and access /dev/mem
beyond the 1M limit by calling mmap_mem() instead. Also,
the parameters of range_is_allowed() were changed to
cleanly handle greater than 32-bits of physical address
on 32-bit architectures.

- some of the newer Nehalem-based systems declare their
CPU DSDT entries as type 'Alias'. During boot, this
caused an 'Error attaching device data' message to be

- the evtchn event channel device lacked locks and memory
barriers. This has led to xenstore becoming unresponsive
on the Itanium® architecture.

- sending of gratuitous ARP packets in the Xen frontend
network driver is now delayed until the backend signals
that its carrier status has been processed by the stack.

- on forcedeth devices, whenever setting ethtool
parameters for link speed, the device could stop
receiving interrupts.

- the CIFS 'forcedirectio' option did not allow text to be
appended to files.

- the gettimeofday() function returned a backwards time on
Intel® 64.

- residual-count corrections during UNDERRUN handling were
added to the qla2xxx driver.

- the fix for a small quirk was removed for certain
Adaptec controllers for which it caused problems.

- the 'xm trigger init' command caused a domain panic if a
userland application was running on a guest on the
Intel® 64 architecture.

See also :

Solution :

Update the affected packages.

Risk factor :

High / CVSS Base Score : 7.1

Family: Scientific Linux Local Security Checks

Nessus Plugin ID: 60488 ()

Bugtraq ID:

CVE ID: CVE-2006-5755

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now