This script is Copyright (C) 2012 Tenable Network Security, Inc.
The remote Scientific Linux host is missing one or more security
There were no new features introduced by this update. The only changes
that have been included address critical customer needs or security
issues (elaborated below).
Key areas affected by fixes in this update include the networking
subsystem, dcache handling, the ext2 and ext3 file systems, the USB
subsystem, ACPI handling, and the audit subsystem. There were also
several isolated fixes in the tg3, e1000, megaraid_sas, and aacraid
The following security bugs were fixed in this update :
- a flaw in the cramfs file system that allowed invalid
compressed data to cause memory corruption
- a flaw in the ext2 file system that allowed an invalid
inode size to cause a denial of service (system hang)
- a flaw in IPV6 flow label handling that allowed a local
user to cause a denial of service (crash)
See also :
Update the affected packages.
Risk factor :
Medium / CVSS Base Score : 4.9