Synopsis: Important: kernel security update
Issue Date: 2013-02-26
CVE Numbers: CVE-2013-0871
—
This update fixes the following security issue:
* A race condition was found in the way the Linux kernel’s ptrace
implementation handled PTRACE_SETREGS requests when the debuggee was woken
due to a SIGKILL signal instead of being stopped. A local, unprivileged user
could use this flaw to escalate their privileges. (CVE-2013-0871, Important)
The system must be rebooted for this update to take effect.
—
SL6
x86_64
kernel-2.6.32-358.0.1.el6.x86_64.rpm
kernel-debug-2.6.32-358.0.1.el6.x86_64.rpm
kernel-debug-debuginfo-2.6.32-358.0.1.el6.x86_64.rpm
kernel-debug-devel-2.6.32-358.0.1.el6.x86_64.rpm
kernel-debuginfo-2.6.32-358.0.1.el6.x86_64.rpm
kernel-debuginfo-common-x86_64-2.6.32-358.0.1.el6.x86_64.rpm
kernel-devel-2.6.32-358.0.1.el6.x86_64.rpm
kernel-headers-2.6.32-358.0.1.el6.x86_64.rpm
perf-2.6.32-358.0.1.el6.x86_64.rpm
perf-debuginfo-2.6.32-358.0.1.el6.x86_64.rpm
python-perf-debuginfo-2.6.32-358.0.1.el6.x86_64.rpm
python-perf-2.6.32-358.0.1.el6.x86_64.rpm
i386
kernel-2.6.32-358.0.1.el6.i686.rpm
kernel-debug-2.6.32-358.0.1.el6.i686.rpm
kernel-debug-debuginfo-2.6.32-358.0.1.el6.i686.rpm
kernel-debug-devel-2.6.32-358.0.1.el6.i686.rpm
kernel-debuginfo-2.6.32-358.0.1.el6.i686.rpm
kernel-debuginfo-common-i686-2.6.32-358.0.1.el6.i686.rpm
kernel-devel-2.6.32-358.0.1.el6.i686.rpm
kernel-headers-2.6.32-358.0.1.el6.i686.rpm
perf-2.6.32-358.0.1.el6.i686.rpm
perf-debuginfo-2.6.32-358.0.1.el6.i686.rpm
python-perf-debuginfo-2.6.32-358.0.1.el6.i686.rpm
python-perf-2.6.32-358.0.1.el6.i686.rpm
noarch
kernel-doc-2.6.32-358.0.1.el6.noarch.rpm
kernel-firmware-2.6.32-358.0.1.el6.noarch.rpm
– Scientific Linux Development Team