Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Products & Services

    Products

    Support

    • Production Support
    • Development Support
    • Product Life Cycles

    Services

    • Consulting
    • Technical Account Management
    • Training & Certifications

    Documentation

    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    All Documentation

    Ecosystem Catalog

    • Red Hat Partner Ecosystem
    • Partner Resources
  • Tools

    Tools

    • Troubleshoot a product issue
    • Packages
    • Errata

    Customer Portal Labs

    • Configuration
    • Deployment
    • Security
    • Troubleshoot
    All labs

    Red Hat Insights

    Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

    Learn More
    Go to Insights
  • Security

    Red Hat Product Security Center

    Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

    Product Security Center

    Security Updates

    • Security Advisories
    • Red Hat CVE Database
    • Security Labs

    Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

    View Responses

    Resources

    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community

    Customer Portal Community

    • Discussions
    • Private Groups
    Community Activity

    Customer Events

    • Red Hat Convergence
    • Red Hat Summit

    Stories

    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
Or troubleshoot an issue.

Select Your Language

  • English
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Thorntail
  • Red Hat build of Eclipse Vert.x
  • Red Hat build of OpenJDK
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Integration
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
  • Red Hat JBoss Data Virtualization
  • Red Hat Process Automation
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
All Products
Red Hat Product Errata RHSA-2012:1148 - Security Advisory
Issued:
2012-08-07
Updated:
2012-08-07

RHSA-2012:1148 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: kernel security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated kernel packages that fix one security issue are now available for
Red Hat Enterprise Linux 6.1 Extended Update Support.

The Red Hat Security Response Team has rated this update as having
important security impact. A Common Vulnerability Scoring System (CVSS)
base score, which gives a detailed severity rating, is available from the
CVE link in the References section.

Description

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

This update fixes the following security issue:

  • A NULL pointer dereference flaw was found in the nf_ct_frag6_reasm()

function in the Linux kernel's netfilter IPv6 connection tracking
implementation. A remote attacker could use this flaw to send
specially-crafted packets to a target system that is using IPv6 and also
has the nf_conntrack_ipv6 kernel module loaded, causing it to crash.
(CVE-2012-2744, Important)

Red Hat would like to thank an anonymous contributor working with the
Beyond Security SecuriTeam Secure Disclosure program for reporting this
issue.

Users should upgrade to these updated packages, which contain a backported
patch to resolve this issue. The system must be rebooted for this update to
take effect.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

To install kernel packages manually, use "rpm -ivh [package]". Do not
use "rpm -Uvh" as that will remove the running kernel binaries from
your system. You may use "rpm -e" to remove old kernels after
determining that the new kernel functions properly on your system.

Affected Products

  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.1 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.1 i386
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 6.1 s390x
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 6.1 ppc64
  • Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.1 x86_64
  • Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.1 i386
  • Red Hat Virtual Storage Appliance (from RHUI) 6.1 x86_64

Fixes

  • BZ - 833402 - CVE-2012-2744 kernel: netfilter: null pointer dereference in nf_ct_frag6_reasm()

CVEs

  • CVE-2012-2744

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.1

SRPM
kernel-2.6.32-131.30.1.el6.src.rpm SHA-256: c729fe496e2ed39599111003cbbc67288ebaaa4603b0b468e09a80721bcdac1a
x86_64
kernel-2.6.32-131.30.1.el6.x86_64.rpm SHA-256: 43917d1b7f955e3b079366cbb7b1440730ec4958e4a813392b36d3a018b555ad
kernel-debug-2.6.32-131.30.1.el6.x86_64.rpm SHA-256: 12950f41662e43d337265d98b9939fea79d4c4540ccda23f54b215eda66a02d3
kernel-debug-debuginfo-2.6.32-131.30.1.el6.x86_64.rpm SHA-256: c874c8550101b5c361d2e884fb97cacefa534a60827d656148c2b78643c6ffb5
kernel-debug-devel-2.6.32-131.30.1.el6.x86_64.rpm SHA-256: 341cadec0270f1d623b04301449e17560f6a546f9c1c9a7245739ef7ac49076b
kernel-debuginfo-2.6.32-131.30.1.el6.x86_64.rpm SHA-256: c0acab9e44209c190f432bb3ec8e225c665d3e792010a4dcbe8bf55cce0b4e4a
kernel-debuginfo-common-x86_64-2.6.32-131.30.1.el6.x86_64.rpm SHA-256: e16304c24337bf220ae138e805b5625f8853bf48a0c24aaf0dbf43b5e35aaac2
kernel-devel-2.6.32-131.30.1.el6.x86_64.rpm SHA-256: fe0705682e9c4cc7ae9b1462578dead64bf5b7b4695fff844396cecac08a12aa
kernel-doc-2.6.32-131.30.1.el6.noarch.rpm SHA-256: 7ab070ad3f2767f247943806538807d771d4d2f6fd0a40d2fc851815442f1f5f
kernel-firmware-2.6.32-131.30.1.el6.noarch.rpm SHA-256: 8b31133511d20ef188ae30fff3317fd991f14981ab599da47c61c109883e8622
kernel-headers-2.6.32-131.30.1.el6.x86_64.rpm SHA-256: 49640b4208759befd6005941e70bb9a8b818d66847be8780a1de4181d0d615b8
perf-2.6.32-131.30.1.el6.x86_64.rpm SHA-256: 0053e09e1bcc7978834452dc3ece84d7cadb0a221c316be8abc0323fc356100b
perf-debuginfo-2.6.32-131.30.1.el6.x86_64.rpm SHA-256: e1246845d98fa8c8cf8e445d4a787351f4881fc716b0acbe4d73b2b70b424f08
i386
kernel-2.6.32-131.30.1.el6.i686.rpm SHA-256: 5c43e3e4ceb68c7cd2609b38581e0d3e7e162a5d9745dd97517cf1e43d2b7807
kernel-debug-2.6.32-131.30.1.el6.i686.rpm SHA-256: 4ceed10dbc49fd7544990ceca96110030e5b66403f51455cd7d0490f053ee618
kernel-debug-debuginfo-2.6.32-131.30.1.el6.i686.rpm SHA-256: e1580af4df40cf7d22de1c0ee104745f3caf61cb245e249d5504f511b3e85204
kernel-debug-devel-2.6.32-131.30.1.el6.i686.rpm SHA-256: 03a3465abc8b1c0e009987962e17804ab7b85848ba879883f684e3a95a9e3b54
kernel-debuginfo-2.6.32-131.30.1.el6.i686.rpm SHA-256: 6fa793200161a4cd6c2e14ca56129e2be7962b07d1cc0aed96644ab9ac5ad545
kernel-debuginfo-common-i686-2.6.32-131.30.1.el6.i686.rpm SHA-256: e9058ab08af7cf1a1cec7cb4a1e7e60c60ca74598fd93b38e7ab599ecf0e522d
kernel-devel-2.6.32-131.30.1.el6.i686.rpm SHA-256: 08bd00b60b1346b5af111fb19740decba7070d597bba1997057578dbfb06247f
kernel-doc-2.6.32-131.30.1.el6.noarch.rpm SHA-256: 7ab070ad3f2767f247943806538807d771d4d2f6fd0a40d2fc851815442f1f5f
kernel-firmware-2.6.32-131.30.1.el6.noarch.rpm SHA-256: 8b31133511d20ef188ae30fff3317fd991f14981ab599da47c61c109883e8622
kernel-headers-2.6.32-131.30.1.el6.i686.rpm SHA-256: c5ea68dc0559b9fb6aa6ae5242ecb278500f23814ce05baac0758805eee7af74
perf-2.6.32-131.30.1.el6.i686.rpm SHA-256: cd6d0ca7bde80d9b666938694cec1f31629210a97f442fd107a1bc88fb5a5e0f
perf-debuginfo-2.6.32-131.30.1.el6.i686.rpm SHA-256: 04d1b60591c51b56f37cf3e5335e3355be9b4e7c77efe16b1e3ab4943eae8e7e

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 6.1

SRPM
kernel-2.6.32-131.30.1.el6.src.rpm SHA-256: c729fe496e2ed39599111003cbbc67288ebaaa4603b0b468e09a80721bcdac1a
s390x
kernel-2.6.32-131.30.1.el6.s390x.rpm SHA-256: f1f5cf4e018d6ed9f08f64ab7253c59d27770f07a13185520ce11c3093578479
kernel-debug-2.6.32-131.30.1.el6.s390x.rpm SHA-256: 96e049f35931935daae44dd5b652853367b57932b5e5457c2f45c9a60335cc73
kernel-debug-debuginfo-2.6.32-131.30.1.el6.s390x.rpm SHA-256: c534486217bcaaf90ce10db3e207270be18aeccd117b9042bbee1184c118080a
kernel-debug-devel-2.6.32-131.30.1.el6.s390x.rpm SHA-256: 9fc2586b2e59f7a482e77183b9694fa8428a0c0a0316193354526e3be45f373d
kernel-debuginfo-2.6.32-131.30.1.el6.s390x.rpm SHA-256: 2c61ac180568cfd1d1b3cc2127d63b08370cc8c59c2e3f76fef330fb09785417
kernel-debuginfo-common-s390x-2.6.32-131.30.1.el6.s390x.rpm SHA-256: 2c2cd14c9720a7bd91feb848062e0e4fbc3d9397fd3071d07b0f1d3dc31d5728
kernel-devel-2.6.32-131.30.1.el6.s390x.rpm SHA-256: 2e350e799d26cf5fbfd20a826162c5b1d8c6cb9e484b73a7a1d3be208174d93b
kernel-doc-2.6.32-131.30.1.el6.noarch.rpm SHA-256: 7ab070ad3f2767f247943806538807d771d4d2f6fd0a40d2fc851815442f1f5f
kernel-firmware-2.6.32-131.30.1.el6.noarch.rpm SHA-256: 8b31133511d20ef188ae30fff3317fd991f14981ab599da47c61c109883e8622
kernel-headers-2.6.32-131.30.1.el6.s390x.rpm SHA-256: ec0c719feccf509695c4b4d11e256b7f795219a02cfa0f37a9dd54442c8cb87a
kernel-kdump-2.6.32-131.30.1.el6.s390x.rpm SHA-256: 7e72df61d4c6e933111bbf1be009078880a326b6d3ea0db6cfe005f34b97e148
kernel-kdump-debuginfo-2.6.32-131.30.1.el6.s390x.rpm SHA-256: e7d172e7abce8a1558a415ff47422b5b79c008aab9629c4effe0754c5b7bfa40
kernel-kdump-devel-2.6.32-131.30.1.el6.s390x.rpm SHA-256: 220ca8bf7e482df1b2a038ea606b2a994a18d17e498af95f8d952de5873384cb
perf-2.6.32-131.30.1.el6.s390x.rpm SHA-256: f12302f5a0121f0768244df1f17a586190905b395e21eeca7bb413ad2cb2466a
perf-debuginfo-2.6.32-131.30.1.el6.s390x.rpm SHA-256: e5e8fa1b6d3c987599d8d9c85bff47544ab70886dc994da14174246ebd6dcb0c

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 6.1

SRPM
kernel-2.6.32-131.30.1.el6.src.rpm SHA-256: c729fe496e2ed39599111003cbbc67288ebaaa4603b0b468e09a80721bcdac1a
ppc64
kernel-2.6.32-131.30.1.el6.ppc64.rpm SHA-256: 94cd5346141af339b7004dac7aad78e6aa61e025c1f8a34f39f868eb8fe141bb
kernel-bootwrapper-2.6.32-131.30.1.el6.ppc64.rpm SHA-256: f58c339346c7072b6dde438661d89d36e98aaf22520477df195a348855ac3a02
kernel-debug-2.6.32-131.30.1.el6.ppc64.rpm SHA-256: c5b236587add7c777ff3b3b34bb9ddabaf0d71c31947c496c2a3217878d8f53a
kernel-debug-debuginfo-2.6.32-131.30.1.el6.ppc64.rpm SHA-256: 0cc50aacab58fde70ded6da1635ba0e097e95d60b93ad36c5e094f1c85871dc9
kernel-debug-devel-2.6.32-131.30.1.el6.ppc64.rpm SHA-256: 38defb9a9e6208f02f9308575d70d40695657a688e97571384c8e647a68d921c
kernel-debuginfo-2.6.32-131.30.1.el6.ppc64.rpm SHA-256: 8ad4b3c4a87575072558a2f59fcabaf9f83f9c27e1e52023e55adfc8b04b716a
kernel-debuginfo-common-ppc64-2.6.32-131.30.1.el6.ppc64.rpm SHA-256: 2bd9d854c41e10838d48af664f6d732f5e1af77f713fb6b5cbfb9e88ef7412f2
kernel-devel-2.6.32-131.30.1.el6.ppc64.rpm SHA-256: b10fcbc897189c4c5a33d4517bdc8f90610c04e81408493e77e67f9973686ac8
kernel-doc-2.6.32-131.30.1.el6.noarch.rpm SHA-256: 7ab070ad3f2767f247943806538807d771d4d2f6fd0a40d2fc851815442f1f5f
kernel-firmware-2.6.32-131.30.1.el6.noarch.rpm SHA-256: 8b31133511d20ef188ae30fff3317fd991f14981ab599da47c61c109883e8622
kernel-headers-2.6.32-131.30.1.el6.ppc64.rpm SHA-256: e326e8bba3ffbdec82e2b1922388eef4a2b5a1f346e52c36aa2c1efd9a9688d7
perf-2.6.32-131.30.1.el6.ppc64.rpm SHA-256: 08fc253f7142d7081f3d9a3772240c5ed91a70e67a439d2f4f6ac8db68d65348
perf-debuginfo-2.6.32-131.30.1.el6.ppc64.rpm SHA-256: 37921a4d7fdfe5887eb89b3727468335b37684aafc9250e1d9a788b7f0d4beb5

Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.1

SRPM
kernel-2.6.32-131.30.1.el6.src.rpm SHA-256: c729fe496e2ed39599111003cbbc67288ebaaa4603b0b468e09a80721bcdac1a
x86_64
kernel-2.6.32-131.30.1.el6.x86_64.rpm SHA-256: 43917d1b7f955e3b079366cbb7b1440730ec4958e4a813392b36d3a018b555ad
kernel-debug-2.6.32-131.30.1.el6.x86_64.rpm SHA-256: 12950f41662e43d337265d98b9939fea79d4c4540ccda23f54b215eda66a02d3
kernel-debug-debuginfo-2.6.32-131.30.1.el6.x86_64.rpm SHA-256: c874c8550101b5c361d2e884fb97cacefa534a60827d656148c2b78643c6ffb5
kernel-debug-devel-2.6.32-131.30.1.el6.x86_64.rpm SHA-256: 341cadec0270f1d623b04301449e17560f6a546f9c1c9a7245739ef7ac49076b
kernel-debuginfo-2.6.32-131.30.1.el6.x86_64.rpm SHA-256: c0acab9e44209c190f432bb3ec8e225c665d3e792010a4dcbe8bf55cce0b4e4a
kernel-debuginfo-common-x86_64-2.6.32-131.30.1.el6.x86_64.rpm SHA-256: e16304c24337bf220ae138e805b5625f8853bf48a0c24aaf0dbf43b5e35aaac2
kernel-devel-2.6.32-131.30.1.el6.x86_64.rpm SHA-256: fe0705682e9c4cc7ae9b1462578dead64bf5b7b4695fff844396cecac08a12aa
kernel-doc-2.6.32-131.30.1.el6.noarch.rpm SHA-256: 7ab070ad3f2767f247943806538807d771d4d2f6fd0a40d2fc851815442f1f5f
kernel-firmware-2.6.32-131.30.1.el6.noarch.rpm SHA-256: 8b31133511d20ef188ae30fff3317fd991f14981ab599da47c61c109883e8622
kernel-headers-2.6.32-131.30.1.el6.x86_64.rpm SHA-256: 49640b4208759befd6005941e70bb9a8b818d66847be8780a1de4181d0d615b8
perf-2.6.32-131.30.1.el6.x86_64.rpm SHA-256: 0053e09e1bcc7978834452dc3ece84d7cadb0a221c316be8abc0323fc356100b
perf-debuginfo-2.6.32-131.30.1.el6.x86_64.rpm SHA-256: e1246845d98fa8c8cf8e445d4a787351f4881fc716b0acbe4d73b2b70b424f08
i386
kernel-2.6.32-131.30.1.el6.i686.rpm SHA-256: 5c43e3e4ceb68c7cd2609b38581e0d3e7e162a5d9745dd97517cf1e43d2b7807
kernel-debug-2.6.32-131.30.1.el6.i686.rpm SHA-256: 4ceed10dbc49fd7544990ceca96110030e5b66403f51455cd7d0490f053ee618
kernel-debug-debuginfo-2.6.32-131.30.1.el6.i686.rpm SHA-256: e1580af4df40cf7d22de1c0ee104745f3caf61cb245e249d5504f511b3e85204
kernel-debug-devel-2.6.32-131.30.1.el6.i686.rpm SHA-256: 03a3465abc8b1c0e009987962e17804ab7b85848ba879883f684e3a95a9e3b54
kernel-debuginfo-2.6.32-131.30.1.el6.i686.rpm SHA-256: 6fa793200161a4cd6c2e14ca56129e2be7962b07d1cc0aed96644ab9ac5ad545
kernel-debuginfo-common-i686-2.6.32-131.30.1.el6.i686.rpm SHA-256: e9058ab08af7cf1a1cec7cb4a1e7e60c60ca74598fd93b38e7ab599ecf0e522d
kernel-devel-2.6.32-131.30.1.el6.i686.rpm SHA-256: 08bd00b60b1346b5af111fb19740decba7070d597bba1997057578dbfb06247f
kernel-doc-2.6.32-131.30.1.el6.noarch.rpm SHA-256: 7ab070ad3f2767f247943806538807d771d4d2f6fd0a40d2fc851815442f1f5f
kernel-firmware-2.6.32-131.30.1.el6.noarch.rpm SHA-256: 8b31133511d20ef188ae30fff3317fd991f14981ab599da47c61c109883e8622
kernel-headers-2.6.32-131.30.1.el6.i686.rpm SHA-256: c5ea68dc0559b9fb6aa6ae5242ecb278500f23814ce05baac0758805eee7af74
perf-2.6.32-131.30.1.el6.i686.rpm SHA-256: cd6d0ca7bde80d9b666938694cec1f31629210a97f442fd107a1bc88fb5a5e0f
perf-debuginfo-2.6.32-131.30.1.el6.i686.rpm SHA-256: 04d1b60591c51b56f37cf3e5335e3355be9b4e7c77efe16b1e3ab4943eae8e7e

Red Hat Virtual Storage Appliance (from RHUI) 6.1

SRPM
x86_64

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
Copyright © 2023 Red Hat, Inc.
  • Privacy Statement
  • Customer Portal Terms of Use
  • All Policies and Guidelines
Red Hat Summit
Twitter