Security fixes :
memory leaks were found on some error paths in the icmp_send() function in the Linux kernel. This could, potentially, cause the network connectivity to cease.
(CVE-2009-0778, Important)
Chris Evans reported a deficiency in the clone() system call when called with the CLONE_PARENT flag. This flaw permits the caller (the parent process) to indicate an arbitrary signal it wants to receive when its child process exits. This could lead to a denial of service of the parent process. (CVE-2009-0028, Moderate)
an off-by-one underflow flaw was found in the eCryptfs subsystem. This could potentially cause a local denial of service when the readlink() function returned an error. (CVE-2009-0269, Moderate)
a deficiency was found in the Remote BIOS Update (RBU) driver for Dell systems. This could allow a local, unprivileged user to cause a denial of service by reading zero bytes from the image_type or packet_size files in ‘/sys/devices/platform/dell_rbu/’.
(CVE-2009-0322, Moderate)
an inverted logic flaw was found in the SysKonnect FDDI PCI adapter driver, allowing driver statistics to be reset only when the CAP_NET_ADMIN capability was absent (local, unprivileged users could reset driver statistics). (CVE-2009-0675, Moderate)
the sock_getsockopt() function in the Linux kernel did not properly initialize a data structure that can be directly returned to user-space when the getsockopt() function is called with SO_BSDCOMPAT optname set. This flaw could possibly lead to memory disclosure.
(CVE-2009-0676, Moderate)
the ext2 and ext3 file system code failed to properly handle corrupted data structures, leading to a possible local denial of service when read or write operations were performed on a specially crafted file system.
(CVE-2008-3528, Low)
a deficiency was found in the libATA implementation.
This could, potentially, lead to a local denial of service. Note: by default, the ‘/dev/sg*’ devices are accessible only to the root user. (CVE-2008-5700, Low)
Bug fixes :
a bug in aic94xx may have caused kernel panics during boot on some systems with certain SATA disks.
(BZ#485909)
a word endianness problem in the qla2xx driver on PowerPC-based machines may have corrupted flash-based devices. (BZ#485908)
a memory leak in pipe() may have caused a system deadlock. The workaround, which involved manually allocating extra file descriptors toprocesses calling do_pipe, is no longer necessary. (BZ#481576)
CPU soft-lockups in the network rate estimator.
(BZ#481746)
bugs in the ixgbe driver caused it to function unreliably on some systems with 16 or more CPU cores.
(BZ#483210)
the iwl4965 driver may have caused a kernel panic.
(BZ#483206)
a bug caused NFS attributes to not update for some long-lived NFS mounted file systems. (BZ#483201)
unmounting a GFS2 file system may have caused a panic.
(BZ#485910)
a bug in ptrace() may have caused a panic when single stepping a target. (BZ#487394)
on some 64-bit systems, notsc was incorrectly set at boot, causing slow gettimeofday() calls. (BZ#488239)
do_machine_check() cleared all Machine Check Exception (MCE) status registers, preventing the BIOS from using them to determine the cause of certain panics and errors. (BZ#490433)
scaling problems caused performance problems for LAPI applications. (BZ#489457)
a panic may have occurred on systems using certain Intel WiFi Link 5000 products when booting with the RF Kill switch on. (BZ#489846)
the TSC is invariant with C/P/T states, and always runs at constant frequency from now on. (BZ#489310)
The system must be rebooted for this update to take effect.
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text is (C) Scientific Linux.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(60559);
script_version("1.8");
script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/14");
script_cve_id("CVE-2008-3528", "CVE-2008-5700", "CVE-2009-0028", "CVE-2009-0269", "CVE-2009-0322", "CVE-2009-0675", "CVE-2009-0676", "CVE-2009-0778");
script_name(english:"Scientific Linux Security Update : kernel on SL5.x i386/x86_64");
script_summary(english:"Checks rpm output for the updated packages");
script_set_attribute(
attribute:"synopsis",
value:
"The remote Scientific Linux host is missing one or more security
updates."
);
script_set_attribute(
attribute:"description",
value:
"Security fixes :
- memory leaks were found on some error paths in the
icmp_send() function in the Linux kernel. This could,
potentially, cause the network connectivity to cease.
(CVE-2009-0778, Important)
- Chris Evans reported a deficiency in the clone() system
call when called with the CLONE_PARENT flag. This flaw
permits the caller (the parent process) to indicate an
arbitrary signal it wants to receive when its child
process exits. This could lead to a denial of service of
the parent process. (CVE-2009-0028, Moderate)
- an off-by-one underflow flaw was found in the eCryptfs
subsystem. This could potentially cause a local denial
of service when the readlink() function returned an
error. (CVE-2009-0269, Moderate)
- a deficiency was found in the Remote BIOS Update (RBU)
driver for Dell systems. This could allow a local,
unprivileged user to cause a denial of service by
reading zero bytes from the image_type or packet_size
files in '/sys/devices/platform/dell_rbu/'.
(CVE-2009-0322, Moderate)
- an inverted logic flaw was found in the SysKonnect FDDI
PCI adapter driver, allowing driver statistics to be
reset only when the CAP_NET_ADMIN capability was absent
(local, unprivileged users could reset driver
statistics). (CVE-2009-0675, Moderate)
- the sock_getsockopt() function in the Linux kernel did
not properly initialize a data structure that can be
directly returned to user-space when the getsockopt()
function is called with SO_BSDCOMPAT optname set. This
flaw could possibly lead to memory disclosure.
(CVE-2009-0676, Moderate)
- the ext2 and ext3 file system code failed to properly
handle corrupted data structures, leading to a possible
local denial of service when read or write operations
were performed on a specially crafted file system.
(CVE-2008-3528, Low)
- a deficiency was found in the libATA implementation.
This could, potentially, lead to a local denial of
service. Note: by default, the '/dev/sg*' devices are
accessible only to the root user. (CVE-2008-5700, Low)
Bug fixes :
- a bug in aic94xx may have caused kernel panics during
boot on some systems with certain SATA disks.
(BZ#485909)
- a word endianness problem in the qla2xx driver on
PowerPC-based machines may have corrupted flash-based
devices. (BZ#485908)
- a memory leak in pipe() may have caused a system
deadlock. The workaround, which involved manually
allocating extra file descriptors toprocesses calling
do_pipe, is no longer necessary. (BZ#481576)
- CPU soft-lockups in the network rate estimator.
(BZ#481746)
- bugs in the ixgbe driver caused it to function
unreliably on some systems with 16 or more CPU cores.
(BZ#483210)
- the iwl4965 driver may have caused a kernel panic.
(BZ#483206)
- a bug caused NFS attributes to not update for some
long-lived NFS mounted file systems. (BZ#483201)
- unmounting a GFS2 file system may have caused a panic.
(BZ#485910)
- a bug in ptrace() may have caused a panic when single
stepping a target. (BZ#487394)
- on some 64-bit systems, notsc was incorrectly set at
boot, causing slow gettimeofday() calls. (BZ#488239)
- do_machine_check() cleared all Machine Check Exception
(MCE) status registers, preventing the BIOS from using
them to determine the cause of certain panics and
errors. (BZ#490433)
- scaling problems caused performance problems for LAPI
applications. (BZ#489457)
- a panic may have occurred on systems using certain Intel
WiFi Link 5000 products when booting with the RF Kill
switch on. (BZ#489846)
- the TSC is invariant with C/P/T states, and always runs
at constant frequency from now on. (BZ#489310)
The system must be rebooted for this update to take effect."
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=481576"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=481746"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=483201"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=483206"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=483210"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=485908"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=485909"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=485910"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=487394"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=488239"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=489310"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=489457"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=489846"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugzilla.redhat.com/show_bug.cgi?id=490433"
);
# https://listserv.fnal.gov/scripts/wa.exe?A2=ind0904&L=scientific-linux-errata&T=0&P=76
script_set_attribute(
attribute:"see_also",
value:"http://www.nessus.org/u?ad870d63"
);
script_set_attribute(attribute:"solution", value:"Update the affected packages.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:C");
script_cwe_id(189, 264, 399);
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"x-cpe:/o:fermilab:scientific_linux");
script_set_attribute(attribute:"vuln_publication_date", value:"2008/09/27");
script_set_attribute(attribute:"patch_publication_date", value:"2009/04/01");
script_set_attribute(attribute:"plugin_publication_date", value:"2012/08/01");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2012-2021 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_family(english:"Scientific Linux Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/RedHat/release", "Host/RedHat/rpm-list");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
release = get_kb_item("Host/RedHat/release");
if (isnull(release) || "Scientific Linux " >!< release) audit(AUDIT_HOST_NOT, "running Scientific Linux");
if (!get_kb_item("Host/RedHat/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if (cpu >!< "x86_64" && cpu !~ "^i[3-6]86$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Scientific Linux", cpu);
flag = 0;
if (rpm_check(release:"SL5", reference:"kernel-2.6.18-128.1.6.el5")) flag++;
if (rpm_check(release:"SL5", cpu:"i386", reference:"kernel-PAE-2.6.18-128.1.6.el5")) flag++;
if (rpm_check(release:"SL5", cpu:"i386", reference:"kernel-PAE-devel-2.6.18-128.1.6.el5")) flag++;
if (rpm_check(release:"SL5", reference:"kernel-debug-2.6.18-128.1.6.el5")) flag++;
if (rpm_check(release:"SL5", reference:"kernel-debug-devel-2.6.18-128.1.6.el5")) flag++;
if (rpm_check(release:"SL5", reference:"kernel-devel-2.6.18-128.1.6.el5")) flag++;
if (rpm_check(release:"SL5", reference:"kernel-doc-2.6.18-128.1.6.el5")) flag++;
if (rpm_check(release:"SL5", reference:"kernel-headers-2.6.18-128.1.6.el5")) flag++;
if (rpm_check(release:"SL5", reference:"kernel-xen-2.6.18-128.1.6.el5")) flag++;
if (rpm_check(release:"SL5", reference:"kernel-xen-devel-2.6.18-128.1.6.el5")) flag++;
if (flag)
{
if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());
else security_hole(0);
exit(0);
}
else audit(AUDIT_HOST_NOT, "affected");
Vendor | Product | Version | CPE |
---|---|---|---|
fermilab | scientific_linux | x-cpe:/o:fermilab:scientific_linux |
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3528
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5700
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0028
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0269
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0322
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0675
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0676
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0778
www.nessus.org/u?ad870d63
bugzilla.redhat.com/show_bug.cgi?id=481576
bugzilla.redhat.com/show_bug.cgi?id=481746
bugzilla.redhat.com/show_bug.cgi?id=483201
bugzilla.redhat.com/show_bug.cgi?id=483206
bugzilla.redhat.com/show_bug.cgi?id=483210
bugzilla.redhat.com/show_bug.cgi?id=485908
bugzilla.redhat.com/show_bug.cgi?id=485909
bugzilla.redhat.com/show_bug.cgi?id=485910
bugzilla.redhat.com/show_bug.cgi?id=487394
bugzilla.redhat.com/show_bug.cgi?id=488239
bugzilla.redhat.com/show_bug.cgi?id=489310
bugzilla.redhat.com/show_bug.cgi?id=489457
bugzilla.redhat.com/show_bug.cgi?id=489846
bugzilla.redhat.com/show_bug.cgi?id=490433