This script is Copyright (C) 2012 Tenable Network Security, Inc.
The remote Scientific Linux host is missing one or more security
There were no new features introduced by this update. The only changes
that have been included address critical customer needs or security
issues (elaborated below).
Key areas affected by fixes in this update include the networking
subsystem, dcache handling, the ext2 and ext3 file systems, the USB
subsystem, ACPI handling, and the audit subsystem. There were also
several isolated fixes in the tg3, e1000, megaraid_sas, and aacraid
The following security bugs were fixed in this update :
- a flaw in the cramfs file system that allowed invalid
compressed data to cause memory corruption
- a flaw in the ext2 file system that allowed an invalid
inode size to cause a denial of service (system hang)
- a flaw in IPV6 flow label handling that allowed a local
user to cause a denial of service (crash)
See also :
Update the affected packages.
Risk factor :
Medium / CVSS Base Score : 4.9
Family: Scientific Linux Local Security Checks
Nessus Plugin ID: 60200 ()
CVE ID: CVE-2006-5823CVE-2006-6054CVE-2007-1592
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.