Scientific Linux Security Update : kernel on SL7.x x86_64

High Nessus Plugin ID 97516


The remote Scientific Linux host is missing one or more security updates.


Security Fix(es) :

- Linux kernel built with the Kernel-based Virtual Machine (CONFIG_KVM) support is vulnerable to a NULL pointer dereference flaw. It could occur on x86 platform, when emulating an undefined instruction. An attacker could use this flaw to crash the host kernel resulting in DoS.
(CVE-2016-8630, Important)

- A race condition issue leading to a use-after-free flaw was found in the way the raw packet sockets implementation in the Linux kernel networking subsystem handled synchronization while creating the TPACKET_V3 ring buffer. A local user able to open a raw packet socket (requires the CAP_NET_RAW capability) could use this flaw to elevate their privileges on the system.
(CVE-2016-8655, Important)

- A flaw was discovered in the Linux kernel's implementation of VFIO. An attacker issuing an ioctl can create a situation where memory is corrupted and modify memory outside of the expected area. This may overwrite kernel memory and subvert kernel execution.
(CVE-2016-9083, Important)

- The use of a kzalloc with an integer multiplication allowed an integer overflow condition to be reached in vfio_pci_intrs.c. This combined with CVE-2016-9083 may allow an attacker to craft an attack and use unallocated memory, potentially crashing the machine.
(CVE-2016-9084, Moderate)


Update the affected packages.

See Also

Plugin Details

Severity: High

ID: 97516

File Name: sl_20170302_kernel_on_SL7_x.nasl

Version: $Revision: 3.3 $

Type: local

Agent: unix

Published: 2017/03/03

Modified: 2017/03/07

Dependencies: 12634

Risk Information

Risk Factor: High


Base Score: 7.2

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C


Base Score: 7.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: x-cpe:/o:fermilab:scientific_linux

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/RedHat/release, Host/RedHat/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2017/03/02

Exploitable With

Core Impact

Reference Information

CVE: CVE-2016-8630, CVE-2016-8655, CVE-2016-9083, CVE-2016-9084