Scientific Linux Security Update : kernel on SL5.x i386/x86_64

Critical Nessus Plugin ID 95984


The remote Scientific Linux host is missing one or more security updates.


Security Fix(es) :

- A use-after-free vulnerability was found in the kernels socket recvmmsg subsystem. This may allows remote attackers to corrupt memory and may allow execution of arbitrary code. This corruption takes place during the error handling routines within __sys_recvmmsg() function. (CVE-2016-7117, Important)

Bug Fix(es) :

- Previously, guest virtual machines (VMs) on a Hyper-V server cluster got in some cases rebooted during the graceful node failover test, because the host kept sending heartbeat packets independently of guests responding to them. This update fixes the bug by properly responding to all the heartbeat messages in the queue, even if they are pending. As a result, guest VMs no longer get rebooted under the described circumstances.


Update the affected packages.

See Also

Plugin Details

Severity: Critical

ID: 95984

File Name: sl_20161220_kernel_on_SL5_x.nasl

Version: $Revision: 3.1 $

Type: local

Agent: unix

Published: 2016/12/21

Modified: 2016/12/21

Dependencies: 12634

Risk Information

Risk Factor: Critical


Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C


Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: x-cpe:/o:fermilab:scientific_linux

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/RedHat/release, Host/RedHat/rpm-list

Patch Publication Date: 2016/12/20

Reference Information

CVE: CVE-2016-7117