Important: kernel (SL6)

Synopsis: Important: kernel security update
Issue Date: 2013-02-26
CVE Numbers: CVE-2013-0871

This update fixes the following security issue:

* A race condition was found in the way the Linux kernel’s ptrace
implementation handled PTRACE_SETREGS requests when the debuggee was woken
due to a SIGKILL signal instead of being stopped. A local, unprivileged user
could use this flaw to escalate their privileges. (CVE-2013-0871, Important)

The system must be rebooted for this update to take effect.

SL6
x86_64
kernel-2.6.32-358.0.1.el6.x86_64.rpm
kernel-debug-2.6.32-358.0.1.el6.x86_64.rpm
kernel-debug-debuginfo-2.6.32-358.0.1.el6.x86_64.rpm
kernel-debug-devel-2.6.32-358.0.1.el6.x86_64.rpm
kernel-debuginfo-2.6.32-358.0.1.el6.x86_64.rpm
kernel-debuginfo-common-x86_64-2.6.32-358.0.1.el6.x86_64.rpm
kernel-devel-2.6.32-358.0.1.el6.x86_64.rpm
kernel-headers-2.6.32-358.0.1.el6.x86_64.rpm
perf-2.6.32-358.0.1.el6.x86_64.rpm
perf-debuginfo-2.6.32-358.0.1.el6.x86_64.rpm
python-perf-debuginfo-2.6.32-358.0.1.el6.x86_64.rpm
python-perf-2.6.32-358.0.1.el6.x86_64.rpm
i386
kernel-2.6.32-358.0.1.el6.i686.rpm
kernel-debug-2.6.32-358.0.1.el6.i686.rpm
kernel-debug-debuginfo-2.6.32-358.0.1.el6.i686.rpm
kernel-debug-devel-2.6.32-358.0.1.el6.i686.rpm
kernel-debuginfo-2.6.32-358.0.1.el6.i686.rpm
kernel-debuginfo-common-i686-2.6.32-358.0.1.el6.i686.rpm
kernel-devel-2.6.32-358.0.1.el6.i686.rpm
kernel-headers-2.6.32-358.0.1.el6.i686.rpm
perf-2.6.32-358.0.1.el6.i686.rpm
perf-debuginfo-2.6.32-358.0.1.el6.i686.rpm
python-perf-debuginfo-2.6.32-358.0.1.el6.i686.rpm
python-perf-2.6.32-358.0.1.el6.i686.rpm
noarch
kernel-doc-2.6.32-358.0.1.el6.noarch.rpm
kernel-firmware-2.6.32-358.0.1.el6.noarch.rpm

– Scientific Linux Development Team