Scientific Linux Security Update : kernel on SL4.x i386/x86_64

This script is Copyright (C) 2012 Tenable Network Security, Inc.


Synopsis :

The remote Scientific Linux host is missing one or more security
updates.

Description :

These updated kernel packages fix the following security issue :

A buffer overflow flaw was found in the CIFS virtual file system. A
remote authenticated user could issue a request that could lead to a
denial of service. (CVE-2007-5904, Moderate)

As well, these updated packages fix the following bugs :

- a bug was found in the Linux kernel audit subsystem.
When the audit daemon was setup to log the execve system
call with a large number of arguments, the kernel could
run out out memory while attempting to create audit log
messages. This could cause a kernel panic. In these
updated packages, large audit messages are split into
acceptable sizes, which resolves this issue.

- on certain Intel chipsets, it was not possible to load
the acpiphp module using the 'modprobe acpiphp' command.
Because the acpiphp module did not recurse across PCI
bridges, hardware detection for PCI hot plug slots
failed. In these updated packages, hardware detection
works correctly.

- on IBM System z architectures that run the IBM z/VM
hypervisor, the IBM eServer zSeries HiperSockets network
interface (layer 3) allowed ARP packets to be sent and
received, even when the 'NOARP' flag was set. These ARP
packets caused problems for virtual machines.

- it was possible for the iounmap function to sleep while
holding a lock. This may have caused a deadlock for
drivers and other code that uses the iounmap function.
In these updated packages, the lock is dropped before
the sleep code is called, which resolves this issue.

See also :

http://www.nessus.org/u?f2cea653

Solution :

Update the affected packages.

Risk factor :

Medium / CVSS Base Score : 6.8
(CVSS2#AV:A/AC:H/Au:N/C:C/I:C/A:C)

Family: Scientific Linux Local Security Checks

Nessus Plugin ID: 60372 ()

Bugtraq ID:

CVE ID: CVE-2007-5904