Rapid7 Vulnerability & Exploit Database

RHSA-2012:0350: kernel security and bug fix update

Back to Search

RHSA-2012:0350: kernel security and bug fix update

Severity
8
CVSS
(AV:N/AC:L/Au:N/C:N/I:N/A:C)
Published
01/27/2012
Created
07/25/2018
Added
03/23/2012
Modified
06/21/2018

Description

The kernel packages contain the Linux kernel, the core of any Linuxoperating system.This update fixes the following security issues:Red Hat would like to thank Nick Bowler for reporting CVE-2011-4081; SashaLevin for reporting CVE-2011-4347; Tetsuo Handa for reportingCVE-2011-4594; Maynard Johnson for reporting CVE-2011-4611; Wang Xi forreporting CVE-2012-0038; Stephan Bärwolf for reporting CVE-2012-0045; andSimon McVittie for reporting CVE-2012-0207. Upstream acknowledges MathieuDesnoyers as the original reporter of CVE-2011-4594.This update also fixes several bugs. Documentation for these changes willbe available shortly from the Technical Notes document linked to in theReferences section.Users should upgrade to these updated packages, which contain backportedpatches to correct these issues, and fix the bugs noted in the TechnicalNotes. The system must be rebooted for this update to take effect.

Solution(s)

  • redhat-upgrade-kernel
  • redhat-upgrade-kernel-bootwrapper
  • redhat-upgrade-kernel-debug
  • redhat-upgrade-kernel-debug-debuginfo
  • redhat-upgrade-kernel-debug-devel
  • redhat-upgrade-kernel-debuginfo
  • redhat-upgrade-kernel-debuginfo-common-i686
  • redhat-upgrade-kernel-debuginfo-common-ppc64
  • redhat-upgrade-kernel-debuginfo-common-s390x
  • redhat-upgrade-kernel-debuginfo-common-x86_64
  • redhat-upgrade-kernel-devel
  • redhat-upgrade-kernel-doc
  • redhat-upgrade-kernel-firmware
  • redhat-upgrade-kernel-headers
  • redhat-upgrade-kernel-kdump
  • redhat-upgrade-kernel-kdump-debuginfo
  • redhat-upgrade-kernel-kdump-devel
  • redhat-upgrade-perf
  • redhat-upgrade-perf-debuginfo
  • redhat-upgrade-python-perf

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;