Scientific Linux Security Update : openafs on SL3.x, SL4.x, SL5.x i386/x86_64

critical Nessus Plugin ID 60579

Synopsis

The remote Scientific Linux host is missing one or more security updates.

Description

An attacker with control of a fileserver, or the ability to forge RX packets, can crash the cache manager, and hence the kernel, of affected Linux AFS clients. (CVE-2009-1250)

An attacker with control of a fileserver, or the ability to forge RX packets, can crash the cache manager, and hence the kernel, of any Unix AFS client. It may be possible for an attacker to cause the kernel to execute arbitrary code. (CVE-2009-1251)

The Scientific Linux Team has backported the patches to the stable version of openafs for SL3, SL4 and SL5.

openafs must be restarted for the update to take effect.

Solution

Update the affected packages.

See Also

http://www.nessus.org/u?95ee4c62

Plugin Details

Severity: Critical

ID: 60579

File Name: sl_20090430_openafs_on_SL3_x.nasl

Version: 1.6

Type: local

Agent: unix

Published: 8/1/2012

Updated: 1/14/2021

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Critical

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: x-cpe:/o:fermilab:scientific_linux

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Patch Publication Date: 4/30/2009

Reference Information

CVE: CVE-2009-1250, CVE-2009-1251

CWE: 119, 189