The remote Scientific Linux host is missing one or more security
These updated packages fix the following security issue :
- a possible kernel memory leak was found in the Linux
kernel Simple Internet Transition (SIT) INET6
implementation. This could allow a local unprivileged
user to cause a denial of service. (CVE-2008-2136,
As well, these updated packages fix the following bugs :
- a possible kernel hang on hugemem systems, due to a bug
in NFS, which may have caused systems to become
unresponsive, has been resolved.
- an inappropriate exit condition occurred in the
architecture-specific 'mmap()' realization, which fell
into an infinite loop under certain conditions. On
64-bit systems, this issue may have manifested itself to
users as a soft lockup, or process hangs.
- due to a bug in hardware initialization in the
'ohci_hcd' kernel module, the kernel may have failed
with a NULL pointer dereference. On 64-bit PowerPC
systems, this may have caused booting to fail, and drop
to xmon. On other platforms, a kernel oops occurred.
- due to insufficient locks in task termination code, a
panic may have occurred in the 'sys_times()' system call
on SMP machines.
See also :
Update the affected packages.
Risk factor :
High / CVSS Base Score : 7.8