Scientific Linux Security Update : kernel on SL5.x i386/x86_64

This script is Copyright (C) 2012 Tenable Network Security, Inc.

Synopsis :

The remote Scientific Linux host is missing one or more security

Description :

a flaw in the mount handling routine for 64-bit systems that allowed a
local user to cause denial of service (CVE-2006-7203, Important).

a flaw in the PPP over Ethernet implementation that allowed a remote
user to cause a denial of service (CVE-2007-2525, Important).

a flaw in the Bluetooth subsystem that allowed a local user to trigger
an information leak (CVE-2007-1353, Low).

a bug in the random number generator that prevented the manual seeding
of the entropy pool (CVE-2007-2453, Low).

In addition to the security issues described above, fixes for the
following have been included :

- a race condition between ext3_link/unlink that could
create an orphan inode list corruption.

- a bug in the e1000 driver that could lead to a watchdog
timeout panic.

See also :

Solution :

Update the affected packages.

Risk factor :

Medium / CVSS Base Score : 4.9

Family: Scientific Linux Local Security Checks

Nessus Plugin ID: 60209 ()

Bugtraq ID:

CVE ID: CVE-2006-7203

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now