Scientific Linux Security Update : GFS on SL3.x i386/x86_64

This script is Copyright (C) 2012 Tenable Network Security, Inc.

Synopsis :

The remote Scientific Linux host is missing one or more security

Description :

A flaw was found in the gfs_lock() implementation. The GFS locking
code could skip the lock operation for files that have the S_ISGID bit
(set-group-ID on execution) in their mode set. A local, unprivileged
user on a system that has a GFS file system mounted could use this
flaw to cause a kernel panic. (CVE-2010-0727)

As well, these updated GFS packages are in sync with the latest kernel
(2.4.21-63.EL). The modules in earlier GFS packages fail to load
because they do not match the running kernel. It is possible to
force-load the modules; however, with this update, force-loading the
modules is not required. (BZ#525198)

Users are advised to upgrade to these latest GFS packages, which
resolve this issue and are updated for use with the 2.4.21-63.EL

See also :

Solution :

Update the affected packages.

Risk factor :

Medium / CVSS Base Score : 4.7

Family: Scientific Linux Local Security Checks

Nessus Plugin ID: 60760 ()

Bugtraq ID:

CVE ID: CVE-2010-0727

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now