Vulnerability Description
Race condition in the ptrace functionality in the Linux kernel before 3.7.5 allows local users to gain privileges via a PTRACE_SETREGS ptrace system call in a crafted application, as demonstrated by ptrace_death.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 3.5, < 3.7.5 |
Related Weaknesses (CWE)
References
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=
- http://lists.opensuse.org/opensuse-security-announce/2013-02/msg00022.html
- http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00018.html
- http://lists.opensuse.org/opensuse-security-announce/2013-06/msg00005.html
- http://rhn.redhat.com/errata/RHSA-2013-0567.html
- http://rhn.redhat.com/errata/RHSA-2013-0661.html
- http://rhn.redhat.com/errata/RHSA-2013-0662.html
- http://rhn.redhat.com/errata/RHSA-2013-0695.html
- http://www.debian.org/security/2013/dsa-2632
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.7.5
- http://www.openwall.com/lists/oss-security/2013/02/15/16
- http://www.ubuntu.com/usn/USN-1736-1
- http://www.ubuntu.com/usn/USN-1737-1
- http://www.ubuntu.com/usn/USN-1738-1
- http://www.ubuntu.com/usn/USN-1739-1
FAQ
What is CVE-2013-0871?
CVE-2013-0871 is a vulnerability with a CVSS score of 6.9 (MEDIUM). Race condition in the ptrace functionality in the Linux kernel before 3.7.5 allows local users to gain privileges via a PTRACE_SETREGS ptrace system call in a crafted application, as demonstrated by p...
How severe is CVE-2013-0871?
CVE-2013-0871 has been rated MEDIUM with a CVSS base score of 6.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2013-0871?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.