First published: Tue Apr 17 2012(Updated: )
The kernel packages contain the Linux kernel, the core of any Linux<br>operating system.<br>This update fixes the following security issues:<br><li> Numerous reference count leaks were found in the Linux kernel's block</li> layer I/O context handling implementation. This could allow a local,<br>unprivileged user to cause a denial of service. (CVE-2012-0879,<br>Moderate)<br><li> A flaw was found in the Linux kernel's cifs_lookup() implementation.</li> POSIX open during lookup should only be supported for regular files. When<br>non-regular files (for example, a named (FIFO) pipe or other special files)<br>are opened on lookup, it could cause a denial of service. (CVE-2012-1090,<br>Moderate)<br><li> It was found that the Linux kernel's register set (regset) common</li> infrastructure implementation did not check if the required get and set<br>handlers were initialized. A local, unprivileged user could use this flaw<br>to cause a denial of service by performing a register set operation with a<br>ptrace() PTRACE_SETREGSET or PTRACE_GETREGSET request. (CVE-2012-1097,<br>Moderate)<br>Red Hat would like to thank H. Peter Anvin for reporting CVE-2012-1097.<br>This update also fixes several bugs and adds various enhancements.<br>Documentation for these changes will be available shortly from the<br>Technical Notes document linked to in the References section.<br>Users should upgrade to these updated packages, which contain backported<br>patches to correct these issues, and fix the bugs and add the enhancements<br>noted in the Technical Notes. The system must be rebooted for this update<br>to take effect.<br>
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <2.6.32-220.13.1.el6 | 2.6.32-220.13.1.el6 |
redhat/kernel | <2.6.32-220.13.1.el6 | 2.6.32-220.13.1.el6 |
redhat/kernel-debug | <2.6.32-220.13.1.el6 | 2.6.32-220.13.1.el6 |
redhat/kernel-debug-debuginfo | <2.6.32-220.13.1.el6 | 2.6.32-220.13.1.el6 |
redhat/kernel-debug-devel | <2.6.32-220.13.1.el6 | 2.6.32-220.13.1.el6 |
redhat/kernel-debuginfo | <2.6.32-220.13.1.el6 | 2.6.32-220.13.1.el6 |
redhat/kernel-devel | <2.6.32-220.13.1.el6 | 2.6.32-220.13.1.el6 |
redhat/kernel-doc | <2.6.32-220.13.1.el6 | 2.6.32-220.13.1.el6 |
redhat/kernel-firmware | <2.6.32-220.13.1.el6 | 2.6.32-220.13.1.el6 |
redhat/kernel-headers | <2.6.32-220.13.1.el6 | 2.6.32-220.13.1.el6 |
redhat/perf | <2.6.32-220.13.1.el6 | 2.6.32-220.13.1.el6 |
redhat/perf-debuginfo | <2.6.32-220.13.1.el6 | 2.6.32-220.13.1.el6 |
redhat/python-perf | <2.6.32-220.13.1.el6 | 2.6.32-220.13.1.el6 |
redhat/kernel-debug | <2.6.32-220.13.1.el6 | 2.6.32-220.13.1.el6 |
redhat/kernel-debug-debuginfo | <2.6.32-220.13.1.el6 | 2.6.32-220.13.1.el6 |
redhat/kernel-debug-devel | <2.6.32-220.13.1.el6 | 2.6.32-220.13.1.el6 |
redhat/kernel-debuginfo | <2.6.32-220.13.1.el6 | 2.6.32-220.13.1.el6 |
redhat/kernel-debuginfo-common-i686 | <2.6.32-220.13.1.el6 | 2.6.32-220.13.1.el6 |
redhat/kernel-devel | <2.6.32-220.13.1.el6 | 2.6.32-220.13.1.el6 |
redhat/kernel-headers | <2.6.32-220.13.1.el6 | 2.6.32-220.13.1.el6 |
redhat/perf | <2.6.32-220.13.1.el6 | 2.6.32-220.13.1.el6 |
redhat/perf-debuginfo | <2.6.32-220.13.1.el6 | 2.6.32-220.13.1.el6 |
redhat/python-perf | <2.6.32-220.13.1.el6 | 2.6.32-220.13.1.el6 |
redhat/kernel-debuginfo-common-s390x | <2.6.32-220.13.1.el6 | 2.6.32-220.13.1.el6 |
redhat/kernel-kdump | <2.6.32-220.13.1.el6 | 2.6.32-220.13.1.el6 |
redhat/kernel-kdump-debuginfo | <2.6.32-220.13.1.el6 | 2.6.32-220.13.1.el6 |
redhat/kernel-kdump-devel | <2.6.32-220.13.1.el6 | 2.6.32-220.13.1.el6 |
redhat/kernel-bootwrapper | <2.6.32-220.13.1.el6 | 2.6.32-220.13.1.el6 |
redhat/kernel-debuginfo-common-ppc64 | <2.6.32-220.13.1.el6 | 2.6.32-220.13.1.el6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.