Scientific Linux Security Update : kernel on SL7.x x86_64

This script is Copyright (C) 2017 Tenable Network Security, Inc.

Synopsis :

The remote Scientific Linux host is missing one or more security

Description :

Security Fix(es) :

- A race condition flaw was found in the N_HLDC Linux
kernel driver when accessing n_hdlc.tbuf list that can
lead to double free. A local, unprivileged user able to
set the HDLC line discipline on the tty device could use
this flaw to increase their privileges on the system.
(CVE-2017-2636, Important)

- A flaw was found in the Linux kernel key management
subsystem in which a local attacker could crash the
kernel or corrupt the stack and additional memory
(denial of service) by supplying a specially crafted RSA
key. This flaw panics the machine during the
verification of the RSA key. (CVE-2016-8650, Moderate)

- A flaw was found in the Linux kernel's implementation of
setsockopt for the SO_{SND|RCV}BUFFORCE setsockopt()
system call. Users with non- namespace CAP_NET_ADMIN are
able to trigger this call and create a situation in
which the sockets sendbuff data size could be negative.
This could adversely affect memory allocations and
create situations where the system could crash or cause
memory corruption. (CVE-2016-9793, Moderate)

- A flaw was found in the Linux kernel's handling of
clearing SELinux attributes on /proc/pid/attr files. An
empty (null) write to this file can crash the system by
causing the system to attempt to access unmapped kernel
memory. (CVE-2017-2618, Moderate)

See also :

Solution :

Update the affected packages.

Risk factor :

High / CVSS Base Score : 7.2
Public Exploit Available : true

Family: Scientific Linux Local Security Checks

Nessus Plugin ID: 99351 ()

Bugtraq ID:

CVE ID: CVE-2016-8650

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now