Scientific Linux Security Update : kernel on SL5.x i386/x86_64
High Nessus Plugin ID 60646
SynopsisThe remote Scientific Linux host is missing one or more security updates.
DescriptionCVE-2009-2692 kernel: uninit op in SOCKOPS_WRAP() leads to privesc
CVE-2009-2698 kernel: udp socket NULL ptr dereference
These updated packages fix the following security issues :
- a flaw was found in the SOCKOPS_WRAP macro in the Linux kernel. This macro did not initialize the sendpage operation in the proto_ops structure correctly. A local, unprivileged user could use this flaw to cause a local denial of service or escalate their privileges.
- a flaw was found in the udp_sendmsg() implementation in the Linux kernel when using the MSG_MORE flag on UDP sockets. A local, unprivileged user could use this flaw to cause a local denial of service or escalate their privileges. (CVE-2009-2698, Important)
These updated packages also fix the following bug :
- in the dlm code, a socket was allocated in tcp_connect_to_sock(), but was not freed in the error exit path. This bug led to a memory leak and an unresponsive system. A reported case of this bug occurred after running 'cman_tool kill -n [nodename]'.
The system must be rebooted for this update to take effect.
SolutionUpdate the affected packages.