[RHSA-2013:0567] kernel security update
Severity
Important
Affected Packages
33
CVEs
1
The kernel packages contain the Linux kernel, the core of any Linux
operating system.
This update fixes the following security issue:
- A race condition was found in the way the Linux kernel's ptrace implementation handled PTRACE_SETREGS requests when the debuggee was woken due to a SIGKILL signal instead of being stopped. A local, unprivileged user could use this flaw to escalate their privileges. (CVE-2013-0871, Important)
Users should upgrade to these updated packages, which contain a backported
patch to correct this issue. The system must be rebooted for this update to
take effect.
- ID
- RHSA-2013:0567
- Severity
- important
- URL
- https://access.redhat.com/errata/RHSA-2013:0567
- Published
-
2013-02-26T00:00:00
(11 years ago) - Modified
-
2013-02-26T00:00:00
(11 years ago) - Rights
- Copyright 2013 Red Hat, Inc.
- Other Advisories
Source | # ID | Name | URL |
---|---|---|---|
Bugzilla | 911937 | https://bugzilla.redhat.com/911937 | |
RHSA | RHSA-2013:0567 | https://access.redhat.com/errata/RHSA-2013:0567 | |
CVE | CVE-2013-0871 | https://access.redhat.com/security/cve/CVE-2013-0871 |
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:rpm/redhat/python-perf?arch=x86_64&distro=redhat-6 | redhat | python-perf | < 2.6.32-358.0.1.el6 | redhat-6 | x86_64 | |
Affected | pkg:rpm/redhat/python-perf?arch=s390x&distro=redhat-6 | redhat | python-perf | < 2.6.32-358.0.1.el6 | redhat-6 | s390x | |
Affected | pkg:rpm/redhat/python-perf?arch=ppc64&distro=redhat-6 | redhat | python-perf | < 2.6.32-358.0.1.el6 | redhat-6 | ppc64 | |
Affected | pkg:rpm/redhat/python-perf?arch=i686&distro=redhat-6 | redhat | python-perf | < 2.6.32-358.0.1.el6 | redhat-6 | i686 | |
Affected | pkg:rpm/redhat/perf?arch=x86_64&distro=redhat-6 | redhat | perf | < 2.6.32-358.0.1.el6 | redhat-6 | x86_64 | |
Affected | pkg:rpm/redhat/perf?arch=s390x&distro=redhat-6 | redhat | perf | < 2.6.32-358.0.1.el6 | redhat-6 | s390x | |
Affected | pkg:rpm/redhat/perf?arch=ppc64&distro=redhat-6 | redhat | perf | < 2.6.32-358.0.1.el6 | redhat-6 | ppc64 | |
Affected | pkg:rpm/redhat/perf?arch=i686&distro=redhat-6 | redhat | perf | < 2.6.32-358.0.1.el6 | redhat-6 | i686 | |
Affected | pkg:rpm/redhat/kernel?arch=x86_64&distro=redhat-6 | redhat | kernel | < 2.6.32-358.0.1.el6 | redhat-6 | x86_64 | |
Affected | pkg:rpm/redhat/kernel?arch=s390x&distro=redhat-6 | redhat | kernel | < 2.6.32-358.0.1.el6 | redhat-6 | s390x | |
Affected | pkg:rpm/redhat/kernel?arch=ppc64&distro=redhat-6 | redhat | kernel | < 2.6.32-358.0.1.el6 | redhat-6 | ppc64 | |
Affected | pkg:rpm/redhat/kernel?arch=i686&distro=redhat-6 | redhat | kernel | < 2.6.32-358.0.1.el6 | redhat-6 | i686 | |
Affected | pkg:rpm/redhat/kernel-kdump?arch=s390x&distro=redhat-6 | redhat | kernel-kdump | < 2.6.32-358.0.1.el6 | redhat-6 | s390x | |
Affected | pkg:rpm/redhat/kernel-kdump-devel?arch=s390x&distro=redhat-6 | redhat | kernel-kdump-devel | < 2.6.32-358.0.1.el6 | redhat-6 | s390x | |
Affected | pkg:rpm/redhat/kernel-headers?arch=x86_64&distro=redhat-6 | redhat | kernel-headers | < 2.6.32-358.0.1.el6 | redhat-6 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-headers?arch=s390x&distro=redhat-6 | redhat | kernel-headers | < 2.6.32-358.0.1.el6 | redhat-6 | s390x | |
Affected | pkg:rpm/redhat/kernel-headers?arch=ppc64&distro=redhat-6 | redhat | kernel-headers | < 2.6.32-358.0.1.el6 | redhat-6 | ppc64 | |
Affected | pkg:rpm/redhat/kernel-headers?arch=i686&distro=redhat-6 | redhat | kernel-headers | < 2.6.32-358.0.1.el6 | redhat-6 | i686 | |
Affected | pkg:rpm/redhat/kernel-firmware?distro=redhat-6 | redhat | kernel-firmware | < 2.6.32-358.0.1.el6 | redhat-6 | ||
Affected | pkg:rpm/redhat/kernel-doc?distro=redhat-6 | redhat | kernel-doc | < 2.6.32-358.0.1.el6 | redhat-6 | ||
Affected | pkg:rpm/redhat/kernel-devel?arch=x86_64&distro=redhat-6 | redhat | kernel-devel | < 2.6.32-358.0.1.el6 | redhat-6 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-devel?arch=s390x&distro=redhat-6 | redhat | kernel-devel | < 2.6.32-358.0.1.el6 | redhat-6 | s390x | |
Affected | pkg:rpm/redhat/kernel-devel?arch=ppc64&distro=redhat-6 | redhat | kernel-devel | < 2.6.32-358.0.1.el6 | redhat-6 | ppc64 | |
Affected | pkg:rpm/redhat/kernel-devel?arch=i686&distro=redhat-6 | redhat | kernel-devel | < 2.6.32-358.0.1.el6 | redhat-6 | i686 | |
Affected | pkg:rpm/redhat/kernel-debug?arch=x86_64&distro=redhat-6 | redhat | kernel-debug | < 2.6.32-358.0.1.el6 | redhat-6 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-debug?arch=s390x&distro=redhat-6 | redhat | kernel-debug | < 2.6.32-358.0.1.el6 | redhat-6 | s390x | |
Affected | pkg:rpm/redhat/kernel-debug?arch=ppc64&distro=redhat-6 | redhat | kernel-debug | < 2.6.32-358.0.1.el6 | redhat-6 | ppc64 | |
Affected | pkg:rpm/redhat/kernel-debug?arch=i686&distro=redhat-6 | redhat | kernel-debug | < 2.6.32-358.0.1.el6 | redhat-6 | i686 | |
Affected | pkg:rpm/redhat/kernel-debug-devel?arch=x86_64&distro=redhat-6 | redhat | kernel-debug-devel | < 2.6.32-358.0.1.el6 | redhat-6 | x86_64 | |
Affected | pkg:rpm/redhat/kernel-debug-devel?arch=s390x&distro=redhat-6 | redhat | kernel-debug-devel | < 2.6.32-358.0.1.el6 | redhat-6 | s390x | |
Affected | pkg:rpm/redhat/kernel-debug-devel?arch=ppc64&distro=redhat-6 | redhat | kernel-debug-devel | < 2.6.32-358.0.1.el6 | redhat-6 | ppc64 | |
Affected | pkg:rpm/redhat/kernel-debug-devel?arch=i686&distro=redhat-6 | redhat | kernel-debug-devel | < 2.6.32-358.0.1.el6 | redhat-6 | i686 | |
Affected | pkg:rpm/redhat/kernel-bootwrapper?arch=ppc64&distro=redhat-6 | redhat | kernel-bootwrapper | < 2.6.32-358.0.1.el6 | redhat-6 | ppc64 |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |