This script is Copyright (C) 2012 Tenable Network Security, Inc.
The remote Scientific Linux host is missing one or more security
- A flaw was found in the handling of process death
signals. This allowed a local user to send arbitrary
signals to the suid-process executed by that user. A
successful exploitation of this flaw depends on the
structure of the suid-program and its signal handling.
- A flaw was found in the CIFS file system. This could
cause the umask values of a process to not be honored on
CIFS file systems where UNIX extensions are supported.
- A flaw was found in the VFAT compat ioctl handling on
64-bit systems. This allowed a local user to corrupt a
kernel_dirent struct and cause a denial of service.
- A flaw was found in the Advanced Linux Sound
Architecture (ALSA). A local user who had the ability to
read the /proc/driver/snd-page-alloc file could see
portions of kernel memory. (CVE-2007-4571, Moderate)
- A flaw was found in the aacraid SCSI driver. This
allowed a local user to make ioctl calls to the driver
that should be restricted to privileged users.
- A flaw was found in the stack expansion when using the
hugetlb kernel on PowerPC systems. This allowed a local
user to cause a denial of service. (CVE-2007-3739,
- A flaw was found in the handling of zombie processes. A
local user could create processes that would not be
properly reaped which could lead to a denial of service.
- A flaw was found in the CIFS file system handling. The
mount option 'sec=' did not enable integrity checking or
produce an error message if used. (CVE-2007-3843, Low)
- A flaw was found in the random number generator
implementation that allowed a local user to cause a
denial of service or possibly gain privileges. This flaw
could be exploited if the root user raised the default
wakeup threshold over the size of the output pool.
Additionally, the following bugs were fixed :
- A flaw was found in the kernel netpoll code, creating a
potential deadlock condition. If the xmit_lock for a
given network interface is held, and a subsequent
netpoll event is generated from within the lock owning
context (a console message for example), deadlock on
that cpu will result, because the netpoll code will
attempt to re-acquire the xmit_lock. The fix is to, in
the netpoll code, only attempt to take the lock, and
fail if it is already acquired (rather than block on
it), and queue the message to be sent for later
delivery. Any user of netpoll code in the kernel
(netdump or netconsole services), is exposed to this
problem, and should resolve the issue by upgrading to
this kernel release immediately.
- A flaw was found where, under 64-bit mode (x86_64), AMD
processors were not able to address greater than a
40-bit physical address space
and Intel processors were
only able to address up to a 36-bit physical address
space. The fix is to increase the physical addressing
for an AMD processor to 48 bits, and an Intel processor
to 38 bits.
- A flaw was found in the xenU kernel that may prevent a
paravirtualized guest with more than one CPU from
starting when running under an Scientific Linux 5.1
hypervisor. The fix is to allow your Scientific Linux 4
Xen SMP guests to boot under a 5.1 hypervisor.
See also :
Update the affected packages.
Risk factor :
Medium / CVSS Base Score : 4.9
Family: Scientific Linux Local Security Checks
Nessus Plugin ID: 60280 ()
CVE ID: CVE-2006-6921CVE-2007-2878CVE-2007-3105CVE-2007-3739CVE-2007-3740CVE-2007-3843CVE-2007-3848CVE-2007-4308CVE-2007-4571
Upgrade to Nessus Professional today!
Start your free Nessus Cloud trial now!
Begin Free Trial
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.