This script is Copyright (C) 2015 Tenable Network Security, Inc.
The remote Scientific Linux host is missing one or more security
A flaw was found in the way the grub2 handled backspace characters
entered in username and password prompts. An attacker with access to
the system console could use this flaw to bypass grub2 password
protection and gain administrative access to the system.
This update also fixes the following bug :
- When upgrading from Scientific Linux 7.1 and earlier, a
configured boot password was not correctly migrated to
the newly introduced user.cfg configuration files. This
could possibly prevent system administrators from
changing grub2 configuration during system boot even if
they provided the correct password. This update corrects
the password migration script and the incorrectly
generated user.cfg file.
See also :
Update the affected packages.
Risk factor :
Medium / CVSS Base Score : 6.9