First published: Tue Nov 06 2012(Updated: )
The kernel packages contain the Linux kernel, the core of any Linux<br>operating system.<br>This update fixes the following security issues:<br><li> A use-after-free flaw was found in the Linux kernel's memory management</li> subsystem in the way quota handling for huge pages was performed. A local,<br>unprivileged user could use this flaw to cause a denial of service or,<br>potentially, escalate their privileges. (CVE-2012-2133, Moderate)<br><li> A use-after-free flaw was found in the madvise() system call</li> implementation in the Linux kernel. A local, unprivileged user could use<br>this flaw to cause a denial of service or, potentially, escalate their<br>privileges. (CVE-2012-3511, Moderate)<br><li> It was found that when running a 32-bit binary that uses a large number</li> of shared libraries, one of the libraries would always be loaded at a<br>predictable address in memory. An attacker could use this flaw to bypass<br>the Address Space Layout Randomization (ASLR) security feature.<br>(CVE-2012-1568, Low)<br><li> Buffer overflow flaws were found in the udf_load_logicalvol() function</li> in the Universal Disk Format (UDF) file system implementation in the Linux<br>kernel. An attacker with physical access to a system could use these flaws<br>to cause a denial of service or escalate their privileges. (CVE-2012-3400,<br>Low)<br>Red Hat would like to thank Shachar Raindel for reporting CVE-2012-2133.<br>This update also fixes several bugs. Documentation for these changes will<br>be available shortly from the Technical Notes document linked to in the<br>References section.<br>Users should upgrade to these updated packages, which contain backported<br>patches to correct these issues, and fix the bugs noted in the Technical<br>Notes. The system must be rebooted for this update to take effect.<br>
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel | <2.6.32-279.14.1.el6 | 2.6.32-279.14.1.el6 |
redhat/kernel | <2.6.32-279.14.1.el6 | 2.6.32-279.14.1.el6 |
redhat/kernel-debug | <2.6.32-279.14.1.el6 | 2.6.32-279.14.1.el6 |
redhat/kernel-debug-debuginfo | <2.6.32-279.14.1.el6 | 2.6.32-279.14.1.el6 |
redhat/kernel-debug-devel | <2.6.32-279.14.1.el6 | 2.6.32-279.14.1.el6 |
redhat/kernel-debuginfo | <2.6.32-279.14.1.el6 | 2.6.32-279.14.1.el6 |
redhat/kernel-devel | <2.6.32-279.14.1.el6 | 2.6.32-279.14.1.el6 |
redhat/kernel-doc | <2.6.32-279.14.1.el6 | 2.6.32-279.14.1.el6 |
redhat/kernel-firmware | <2.6.32-279.14.1.el6 | 2.6.32-279.14.1.el6 |
redhat/kernel-headers | <2.6.32-279.14.1.el6 | 2.6.32-279.14.1.el6 |
redhat/perf | <2.6.32-279.14.1.el6 | 2.6.32-279.14.1.el6 |
redhat/perf-debuginfo | <2.6.32-279.14.1.el6 | 2.6.32-279.14.1.el6 |
redhat/python-perf | <2.6.32-279.14.1.el6 | 2.6.32-279.14.1.el6 |
redhat/python-perf-debuginfo | <2.6.32-279.14.1.el6 | 2.6.32-279.14.1.el6 |
redhat/kernel-debug | <2.6.32-279.14.1.el6 | 2.6.32-279.14.1.el6 |
redhat/kernel-debug-debuginfo | <2.6.32-279.14.1.el6 | 2.6.32-279.14.1.el6 |
redhat/kernel-debug-devel | <2.6.32-279.14.1.el6 | 2.6.32-279.14.1.el6 |
redhat/kernel-debuginfo | <2.6.32-279.14.1.el6 | 2.6.32-279.14.1.el6 |
redhat/kernel-debuginfo-common-i686 | <2.6.32-279.14.1.el6 | 2.6.32-279.14.1.el6 |
redhat/kernel-devel | <2.6.32-279.14.1.el6 | 2.6.32-279.14.1.el6 |
redhat/kernel-headers | <2.6.32-279.14.1.el6 | 2.6.32-279.14.1.el6 |
redhat/perf | <2.6.32-279.14.1.el6 | 2.6.32-279.14.1.el6 |
redhat/perf-debuginfo | <2.6.32-279.14.1.el6 | 2.6.32-279.14.1.el6 |
redhat/python-perf | <2.6.32-279.14.1.el6 | 2.6.32-279.14.1.el6 |
redhat/python-perf-debuginfo | <2.6.32-279.14.1.el6 | 2.6.32-279.14.1.el6 |
redhat/kernel-debuginfo-common-s390x | <2.6.32-279.14.1.el6 | 2.6.32-279.14.1.el6 |
redhat/kernel-kdump | <2.6.32-279.14.1.el6 | 2.6.32-279.14.1.el6 |
redhat/kernel-kdump-debuginfo | <2.6.32-279.14.1.el6 | 2.6.32-279.14.1.el6 |
redhat/kernel-kdump-devel | <2.6.32-279.14.1.el6 | 2.6.32-279.14.1.el6 |
redhat/kernel-bootwrapper | <2.6.32-279.14.1.el6 | 2.6.32-279.14.1.el6 |
redhat/kernel-debuginfo-common-ppc64 | <2.6.32-279.14.1.el6 | 2.6.32-279.14.1.el6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.