This script is Copyright (C) 2012 Tenable Network Security, Inc.
The remote Scientific Linux host is missing one or more security
This update fixes the following security issues :
- A flaw was found in the Linux kernel's garbage collector
for AF_UNIX sockets. A local, unprivileged user could
use this flaw to trigger a denial of service
(out-of-memory condition). (CVE-2010-4249, Moderate)
- A flaw was found in the Linux kernel's networking
subsystem. If the number of packets received exceeded
the receiver's buffer limit, they were queued in a
backlog, consuming memory, instead of being discarded. A
remote attacker could abuse this flaw to cause a denial
of service (out-of-memory condition). (CVE-2010-4251,
- A missing initialization flaw was found in the
ethtool_get_regs() function in the Linux kernel's
ethtool IOCTL handler. A local user who has the
CAP_NET_ADMIN capability could use this flaw to cause an
information leak. (CVE-2010-4655, Low)
This update also fixes several bugs.
The system must be rebooted for this update to take effect.
NOTE: For those who have tested our updated openafs package for SL5,
you will need to enable the sl-testing repository to properly do this
update. We apologize for this. yum --enablerepo=sl-testing update
kernel\* Again, this is only for those who have updated openafs to
See also :
Update the affected packages.
Risk factor :
Medium / CVSS Base Score : 6.1