Scientific Linux Security Update : tcl on SL5.x i386/x86_64

This script is Copyright (C) 2013-2016 Tenable Network Security, Inc.

Synopsis :

The remote Scientific Linux host is missing one or more security

Description :

Two denial of service flaws were found in the Tcl regular expression
handling engine. If Tcl or an application using Tcl processed a
specially crafted regular expression, it would lead to excessive CPU
and memory consumption. (CVE-2007-4772, CVE-2007-6067)

This update also fixes the following bug :

- Due to a suboptimal implementation of threading in the
current version of the Tcl language interpreter, an
attempt to use threads in combination with fork in a Tcl
script could cause the script to stop responding. At the
moment, it is not possible to rewrite the source code or
drop support for threading entirely. Consequent to this,
this update provides a version of Tcl without threading
support in addition to the standard version with this
support. Users who need to use fork in their Tcl scripts
and do not require threading can now switch to the
version without threading support by using the
alternatives command.

See also :

Solution :

Update the affected packages.

Risk factor :

Medium / CVSS Base Score : 6.8

Family: Scientific Linux Local Security Checks

Nessus Plugin ID: 63605 ()

Bugtraq ID:

CVE ID: CVE-2007-4772

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now