The remote Scientific Linux host is missing one or more security
A flaw was found in the handling of IEEE 802.11 frames, which affected
several wireless LAN modules. In certain situations, a remote attacker
could trigger this flaw by sending a malicious packet over a wireless
network, causing a denial of service (kernel crash). (CVE-2007-4997,
A memory leak was found in the Red Hat Content Accelerator kernel
patch. A local user could use this flaw to cause a denial of service
(memory exhaustion). (CVE-2007-5494, Important)
Additionally, the following bugs were fixed :
- when running the 'ls -la' command on an NFSv4 mount
point, incorrect file attributes, and outdated file size
and timestamp information were returned. As well,
symbolic links may have been displayed as actual files.
- a bug which caused the cmirror write path to appear
deadlocked after a successful recovery, which may have
caused syncing to hang, has been resolved.
- a kernel panic which occurred when manually configuring
LCS interfaces on the IBM S/390 has been resolved.
- when running a 32-bit binary on a 64-bit system, it was
possible to mmap page at address 0 without flag
MAP_FIXED set. This has been resolved in these updated
- the Non-Maskable Interrupt (NMI) Watchdog did not
increment the NMI interrupt counter in
'/proc/interrupts' on systems running an AMD Opteron
CPU. This caused systems running NMI Watchdog to restart
at regular intervals.
- a bug which caused the diskdump utility to run very
slowly on devices using Fusion MPT has been resolved.
See also :
Update the affected packages.
Risk factor :
High / CVSS Base Score : 7.1