Scientific Linux Security Update : kernel on SL4.x i386/x86_64

This script is Copyright (C) 2012 Tenable Network Security, Inc.


Synopsis :

The remote Scientific Linux host is missing one or more security
updates.

Description :

A flaw was found in the handling of IEEE 802.11 frames, which affected
several wireless LAN modules. In certain situations, a remote attacker
could trigger this flaw by sending a malicious packet over a wireless
network, causing a denial of service (kernel crash). (CVE-2007-4997,
Important)

A memory leak was found in the Red Hat Content Accelerator kernel
patch. A local user could use this flaw to cause a denial of service
(memory exhaustion). (CVE-2007-5494, Important)

Additionally, the following bugs were fixed :

- when running the 'ls -la' command on an NFSv4 mount
point, incorrect file attributes, and outdated file size
and timestamp information were returned. As well,
symbolic links may have been displayed as actual files.

- a bug which caused the cmirror write path to appear
deadlocked after a successful recovery, which may have
caused syncing to hang, has been resolved.

- a kernel panic which occurred when manually configuring
LCS interfaces on the IBM S/390 has been resolved.

- when running a 32-bit binary on a 64-bit system, it was
possible to mmap page at address 0 without flag
MAP_FIXED set. This has been resolved in these updated
packages.

- the Non-Maskable Interrupt (NMI) Watchdog did not
increment the NMI interrupt counter in
'/proc/interrupts' on systems running an AMD Opteron
CPU. This caused systems running NMI Watchdog to restart
at regular intervals.

- a bug which caused the diskdump utility to run very
slowly on devices using Fusion MPT has been resolved.

See also :

http://www.nessus.org/u?02e1b6e3

Solution :

Update the affected packages.

Risk factor :

High / CVSS Base Score : 7.1
(CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:C)

Family: Scientific Linux Local Security Checks

Nessus Plugin ID: 60335 ()

Bugtraq ID:

CVE ID: CVE-2007-4997
CVE-2007-5494