Scientific Linux Security Update : kernel on SL6.x i386/x86_64

High Nessus Plugin ID 61302


The remote Scientific Linux host is missing one or more security updates.


The kernel packages contain the Linux kernel, the core of any Linux operating system.

This update fixes the following security issues :

- Numerous reference count leaks were found in the Linux kernel's block layer I/O context handling implementation. This could allow a local, unprivileged user to cause a denial of service. (CVE-2012-0879, Moderate)

- A flaw was found in the Linux kernel's cifs_lookup() implementation. POSIX open during lookup should only be supported for regular files. When non-regular files (for example, a named (FIFO) pipe or other special files) are opened on lookup, it could cause a denial of service.
(CVE-2012-1090, Moderate)

- It was found that the Linux kernel's register set (regset) common infrastructure implementation did not check if the required get and set handlers were initialized. A local, unprivileged user could use this flaw to cause a denial of service by performing a register set operation with a ptrace() PTRACE_SETREGSET or PTRACE_GETREGSET request. (CVE-2012-1097, Moderate)

This update also fixes several bugs and adds various enhancements. The system must be rebooted for this update to take effect.


Update the affected packages.

See Also

Plugin Details

Severity: High

ID: 61302

File Name: sl_20120417_kernel_on_SL6_x.nasl

Version: $Revision: 1.1 $

Type: local

Agent: unix

Published: 2012/08/01

Modified: 2012/08/01

Dependencies: 12634

Risk Information

Risk Factor: High


Base Score: 7.2

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: x-cpe:/o:fermilab:scientific_linux

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/RedHat/release, Host/RedHat/rpm-list

Patch Publication Date: 2012/04/17

Reference Information

CVE: CVE-2012-0879, CVE-2012-1090, CVE-2012-1097