Public Date:
911937: CVE-2013-0871 kernel: race condition with PTRACE_SETREGS

The MITRE CVE dictionary describes this issue as:

Race condition in the ptrace functionality in the Linux kernel before 3.7.5 allows local users to gain privileges via a PTRACE_SETREGS ptrace system call in a crafted application, as demonstrated by ptrace_death.

Find out more about CVE-2013-0871 from the MITRE CVE dictionary dictionary and NIST NVD.


This issue did affect the versions of the kernel package as shipped with Red Hat Enterprise Linux 5, 6 and Red Hat Enterprise MRG 2. Future updates may address this issue.

Please note that while a public non-weaponized exploit exists, according to our testing the issue is very hard to hit.

CVSS v2 metrics

Base Score 6.2
Base Metrics AV:L/AC:H/Au:N/C:C/I:C/A:C
Access Vector Local
Access Complexity High
Authentication None
Confidentiality Impact Complete
Integrity Impact Complete
Availability Impact Complete

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat Security Errata

Platform Errata Release Date
Red Hat Enterprise Linux Extended Update Support 6.3 (kernel) RHSA-2013:0662 2013-03-19
Red Hat Enterprise Linux Server EUS (v. 6.1) (kernel) RHSA-2013:0661 2013-03-19
Red Hat Enterprise Linux 6 (kernel) RHSA-2013:0567 2013-02-26
Red Hat Enterprise Linux Extended Update Support 6.2 (kernel) RHSA-2013:0741 2013-04-16
Red Hat Enterprise Linux 5 (kernel) RHSA-2013:0621 2013-03-11
Red Hat MRG Grid for RHEL 6 Server v.2 (kernel-rt) RHSA-2013:0622 2013-03-11
Red Hat Enterprise Linux EUS (v. 5.6 server) (kernel) RHSA-2013:0695 2013-04-02

Affected Packages State

Platform Package State
Red Hat Enterprise MRG 2 realtime-kernel Affected

Last Modified

CVE description copyright © 2017, The MITRE Corporation


Welcome! Check out the Getting Started with Red Hat page for quick tours and guides for common tasks.