Skip to navigation

CVE Database

CVE-2013-0871

Impact: Important
Public: 2013-02-15
Bugzilla: 911937: CVE-2013-0871 kernel: race condition with PTRACE_SETREGS

Details

The MITRE CVE dictionary describes this issue as:

Race condition in the ptrace functionality in the Linux kernel before 3.7.5 allows local users to gain privileges via a PTRACE_SETREGS ptrace system call in a crafted application, as demonstrated by ptrace_death.

Find out more about CVE-2013-0871 from the MITRE CVE dictionary and NIST NVD.

Statement

This issue did affect the versions of the kernel package as shipped with Red Hat Enterprise Linux 5, 6 and Red Hat Enterprise MRG 2. Future updates may address this issue.

Please note that while a public non-weaponized exploit exists, according to our testing the issue is very hard to hit.

CVSS v2 metrics

Base Score: 6.2
Base Metrics: AV:L/AC:H/Au:N/C:C/I:C/A:C
Access Vector: Local
Access Complexity: High
Authentication: None
Confidentiality Impact: Complete
Integrity Impact: Complete
Availability Impact: Complete

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat security errata

Platform Errata Release Date
MRG Grid for RHEL 6 Server v.2 (kernel-rt) RHSA-2013:0622 March 11, 2013
Red Hat Enterprise Linux EUS (v. 5.6 server) (kernel) RHSA-2013:0695 April 02, 2013
Red Hat Enterprise Linux Server EUS (v. 6.1) (kernel) RHSA-2013:0661 March 19, 2013
Red Hat Enterprise Linux Server EUS (v. 6.2) (kernel) RHSA-2013:0741 April 16, 2013
Red Hat Enterprise Linux Server EUS (v. 6.3) (kernel) RHSA-2013:0662 March 19, 2013
Red Hat Enterprise Linux version 5 (kernel) RHSA-2013:0621 March 11, 2013
Red Hat Enterprise Linux version 6 (kernel) RHSA-2013:0567 February 26, 2013

External References

This page is generated automatically and has not been checked for errors or omissions.

For clarification or corrections please contact the Red Hat Security Response Team.