Lucene search

K
centosCentOS ProjectCESA-2013:0567
HistoryFeb 27, 2013 - 8:10 p.m.

kernel, perf, python security update

2013-02-2720:10:11
CentOS Project
lists.centos.org
83

6.9 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C

0.0004 Low

EPSS

Percentile

10.3%

CentOS Errata and Security Advisory CESA-2013:0567

The kernel packages contain the Linux kernel, the core of any Linux
operating system.

This update fixes the following security issue:

  • A race condition was found in the way the Linux kernel’s ptrace
    implementation handled PTRACE_SETREGS requests when the debuggee was woken
    due to a SIGKILL signal instead of being stopped. A local, unprivileged
    user could use this flaw to escalate their privileges. (CVE-2013-0871,
    Important)

Users should upgrade to these updated packages, which contain a backported
patch to correct this issue. The system must be rebooted for this update to
take effect.

Merged security bulletin from advisories:
https://lists.centos.org/pipermail/centos-announce/2013-March/081787.html
https://lists.centos.org/pipermail/centos-cr-announce/2013-February/027078.html

Affected packages:
kernel
kernel-debug
kernel-debug-devel
kernel-devel
kernel-doc
kernel-firmware
kernel-headers
perf
python-perf

Upstream details at:
https://access.redhat.com/errata/RHSA-2013:0567

6.9 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C

0.0004 Low

EPSS

Percentile

10.3%