Rapid7 Vulnerability & Exploit Database

RHSA-2011:1530: Red Hat Enterprise Linux 6 kernel security, bug fix and enhancement update

Back to Search

RHSA-2011:1530: Red Hat Enterprise Linux 6 kernel security, bug fix and enhancement update

Severity
5
CVSS
(AV:A/AC:H/Au:N/C:N/I:N/A:C)
Published
01/27/2012
Created
07/25/2018
Added
01/27/2012
Modified
06/21/2018

Description

The kernel packages contain the Linux kernel, the core of any Linuxoperating system.This update fixes the following security issues:Red Hat would like to thank Kees Cook for reporting CVE-2011-1020; SomnathKotur for reporting CVE-2011-3347; and Zheng Liu for reportingCVE-2011-3638.This update also fixes several hundred bugs and adds enhancements. Refer tothe Red Hat Enterprise Linux 6.2 Release Notes for information on the mostsignificant of these changes, and the Technical Notes for furtherinformation, both linked to in the References.All Red Hat Enterprise Linux 6 users are advised to install these updatedpackages, which correct these issues, and fix the bugs and add theenhancements noted in the Red Hat Enterprise Linux 6.2 Release Notes andTechnical Notes. The system must be rebooted for this update to takeeffect.

Solution(s)

  • redhat-upgrade-kernel
  • redhat-upgrade-kernel-bootwrapper
  • redhat-upgrade-kernel-debug
  • redhat-upgrade-kernel-debug-debuginfo
  • redhat-upgrade-kernel-debug-devel
  • redhat-upgrade-kernel-debuginfo
  • redhat-upgrade-kernel-debuginfo-common-i686
  • redhat-upgrade-kernel-debuginfo-common-ppc64
  • redhat-upgrade-kernel-debuginfo-common-s390x
  • redhat-upgrade-kernel-debuginfo-common-x86_64
  • redhat-upgrade-kernel-devel
  • redhat-upgrade-kernel-doc
  • redhat-upgrade-kernel-firmware
  • redhat-upgrade-kernel-headers
  • redhat-upgrade-kernel-kdump
  • redhat-upgrade-kernel-kdump-debuginfo
  • redhat-upgrade-kernel-kdump-devel
  • redhat-upgrade-perf
  • redhat-upgrade-perf-debuginfo
  • redhat-upgrade-python-perf

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;