CVE-2013-0871

Impact:
Important
Public Date:
2013-02-15
Bugzilla:
911937: CVE-2013-0871 kernel: race condition with PTRACE_SETREGS

The MITRE CVE dictionary describes this issue as:

Race condition in the ptrace functionality in the Linux kernel before 3.7.5 allows local users to gain privileges via a PTRACE_SETREGS ptrace system call in a crafted application, as demonstrated by ptrace_death.

Find out more about CVE-2013-0871 from the MITRE CVE dictionary dictionary and NIST NVD.

Statement

This issue did affect the versions of the kernel package as shipped with Red Hat Enterprise Linux 5, 6 and Red Hat Enterprise MRG 2. Future updates may address this issue. Please note that while a public non-weaponized exploit exists, according to our testing the issue is very hard to hit.

CVSS v2 metrics

NOTE: The following CVSS v2 metrics and score provided are preliminary and subject to review.

Base Score 6.2
Base Metrics AV:L/AC:H/Au:N/C:C/I:C/A:C
Access Vector Local
Access Complexity High
Authentication None
Confidentiality Impact Complete
Integrity Impact Complete
Availability Impact Complete

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat Security Errata

Platform Errata Release Date
Red Hat Enterprise Linux version 6 (kernel) RHSA-2013:0567 2013-02-26
Red Hat Enterprise Linux Server EUS (v. 6.3) (kernel) RHSA-2013:0662 2013-03-19
Red Hat Enterprise Linux Server EUS (v. 6.1) (kernel) RHSA-2013:0661 2013-03-19
Red Hat Enterprise Linux version 5 (kernel) RHSA-2013:0621 2013-03-11
Red Hat Enterprise Linux Server EUS (v. 6.2) (kernel) RHSA-2013:0741 2013-04-16
MRG Grid for RHEL 6 Server v.2 (kernel-rt) RHSA-2013:0622 2013-03-11
Red Hat Enterprise Linux EUS (v. 5.6 server) (kernel) RHSA-2013:0695 2013-04-02

Affected Packages State

Platform Package State
Red Hat Enterprise Linux Server EUS (v. 6.1) kernel Affected
Red Hat Enterprise Linux EUS (v. 5.6 server) kernel Affected