Bug 911937 (CVE-2013-0871)
Summary: | CVE-2013-0871 kernel: race condition with PTRACE_SETREGS | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Petr Matousek <pmatouse> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | high | Docs Contact: | |
Priority: | high | ||
Version: | unspecified | CC: | agordeev, andy.fletcher, anton, bflad417, bhu, bugreports2005, collura, davej, dhoward, ekuric, fhirtz, fhrbata, frankp, gansalmon, hill-robert, iboverma, itamar, jforbes, jkacur, jlieskov, jneedle, johnny, jonathan, just4nick, jwboyer, kbsingh, kernel-maint, kernel-mgr, khorenko, laskov, lgoncalv, lwang, madhu.chinakonda, mcressma, mjc, npajkovs, onestero, pasteur, pgampe.au, plougher, redhat, redhat, rob.townley, rt-maint, rvrbovsk, sander, sforsber, stephan.wiesand, toracat, williams |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2013-04-16 19:21:12 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 911942, 912071, 912072, 912073, 912074, 912075, 912077, 913074, 913075, 913076, 916531 | ||
Bug Blocks: | 911941, 915776 |
Description
Petr Matousek
2013-02-16 20:35:31 UTC
Created kernel tracking bugs for this issue Affects: fedora-all [bug 911942] Statement: This issue did affect the versions of the kernel package as shipped with Red Hat Enterprise Linux 5, 6 and Red Hat Enterprise MRG 2. Future updates may address this issue. Please note that while a public non-weaponized exploit exists, according to our testing the issue is very hard to hit. This issue has been addressed in following products: Red Hat Enterprise Linux 6 Via RHSA-2013:0567 https://rhn.redhat.com/errata/RHSA-2013-0567.html Is this issue going to be addressed in Red Hat Enterprise Linux 5, or is Comment 5 wrong about it being affected? This issue has been addressed in following products: MRG for RHEL-6 v.2 Via RHSA-2013:0622 https://rhn.redhat.com/errata/RHSA-2013-0622.html This issue has been addressed in following products: Red Hat Enterprise Linux 5 Via RHSA-2013:0621 https://rhn.redhat.com/errata/RHSA-2013-0621.html Hello, (In reply to comment #17) > Is this issue going to be addressed in Red Hat Enterprise Linux 5, or is > Comment 5 wrong about it being affected? today we released RHSA-2013:0621 (https://rhn.redhat.com/errata/RHSA-2013-0621.html) that fixes this issue in Red Hat Enterprise Linux 5. Best regards, -- Petr Matousek / Red Hat Security Response Team This issue has been addressed in following products: Red Hat Enterprise Linux 6.3 EUS - Server Only Via RHSA-2013:0662 https://rhn.redhat.com/errata/RHSA-2013-0662.html This issue has been addressed in following products: Red Hat Enterprise Linux 6.1 EUS - Server Only Via RHSA-2013:0661 https://rhn.redhat.com/errata/RHSA-2013-0661.html This issue has been addressed in following products: Red Hat Enterprise Linux 5.6 EUS - Server Only Via RHSA-2013:0695 https://rhn.redhat.com/errata/RHSA-2013-0695.html This issue has been addressed in following products: Red Hat Enterprise Linux 6.2 EUS - Server Only Via RHSA-2013:0741 https://rhn.redhat.com/errata/RHSA-2013-0741.html |