This script is Copyright (C) 2012 Tenable Network Security, Inc.
The remote Scientific Linux host is missing one or more security
These updated kernel packages fix the following security issue :
A buffer overflow flaw was found in the CIFS virtual file system. A
remote authenticated user could issue a request that could lead to a
denial of service. (CVE-2007-5904, Moderate)
As well, these updated packages fix the following bugs :
- a bug was found in the Linux kernel audit subsystem.
When the audit daemon was setup to log the execve system
call with a large number of arguments, the kernel could
run out out memory while attempting to create audit log
messages. This could cause a kernel panic. In these
updated packages, large audit messages are split into
acceptable sizes, which resolves this issue.
- on certain Intel chipsets, it was not possible to load
the acpiphp module using the 'modprobe acpiphp' command.
Because the acpiphp module did not recurse across PCI
bridges, hardware detection for PCI hot plug slots
failed. In these updated packages, hardware detection
- on IBM System z architectures that run the IBM z/VM
hypervisor, the IBM eServer zSeries HiperSockets network
interface (layer 3) allowed ARP packets to be sent and
received, even when the 'NOARP' flag was set. These ARP
packets caused problems for virtual machines.
- it was possible for the iounmap function to sleep while
holding a lock. This may have caused a deadlock for
drivers and other code that uses the iounmap function.
In these updated packages, the lock is dropped before
the sleep code is called, which resolves this issue.
See also :
Update the affected packages.
Risk factor :
Medium / CVSS Base Score : 6.8
Family: Scientific Linux Local Security Checks
Nessus Plugin ID: 60372 ()
CVE ID: CVE-2007-5904
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.