Scientific Linux Security Update : kernel on SL3.x i386/x86_64

This script is Copyright (C) 2012 Tenable Network Security, Inc.

Synopsis :

The remote Scientific Linux host is missing one or more security

Description :

There were no new features introduced by this update. The only changes
that have been included address critical customer needs or security
issues (elaborated below).

Key areas affected by fixes in this update include the networking
subsystem, dcache handling, the ext2 and ext3 file systems, the USB
subsystem, ACPI handling, and the audit subsystem. There were also
several isolated fixes in the tg3, e1000, megaraid_sas, and aacraid
device drivers.

The following security bugs were fixed in this update :

- a flaw in the cramfs file system that allowed invalid
compressed data to cause memory corruption
(CVE-2006-5823, low)

- a flaw in the ext2 file system that allowed an invalid
inode size to cause a denial of service (system hang)
(CVE-2006-6054, low)

- a flaw in IPV6 flow label handling that allowed a local
user to cause a denial of service (crash)
(CVE-2007-1592, important)

See also :

Solution :

Update the affected packages.

Risk factor :

Medium / CVSS Base Score : 4.9

Family: Scientific Linux Local Security Checks

Nessus Plugin ID: 60200 ()

Bugtraq ID:

CVE ID: CVE-2006-5823

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now