Synopsis:          Important: kernel security update
Issue Date:        2013-02-26
CVE Numbers:       CVE-2013-0871
--

This update fixes the following security issue:

* A race condition was found in the way the Linux kernel's ptrace
implementation handled PTRACE_SETREGS requests when the debuggee was woken
due to a SIGKILL signal instead of being stopped. A local, unprivileged user
could use this flaw to escalate their privileges. (CVE-2013-0871, Important)

The system must be rebooted for this update to take effect.
--

SL6
   x86_64
     kernel-2.6.32-358.0.1.el6.x86_64.rpm
     kernel-debug-2.6.32-358.0.1.el6.x86_64.rpm
     kernel-debug-debuginfo-2.6.32-358.0.1.el6.x86_64.rpm
     kernel-debug-devel-2.6.32-358.0.1.el6.x86_64.rpm
     kernel-debuginfo-2.6.32-358.0.1.el6.x86_64.rpm
     kernel-debuginfo-common-x86_64-2.6.32-358.0.1.el6.x86_64.rpm
     kernel-devel-2.6.32-358.0.1.el6.x86_64.rpm
     kernel-headers-2.6.32-358.0.1.el6.x86_64.rpm
     perf-2.6.32-358.0.1.el6.x86_64.rpm
     perf-debuginfo-2.6.32-358.0.1.el6.x86_64.rpm
     python-perf-debuginfo-2.6.32-358.0.1.el6.x86_64.rpm
     python-perf-2.6.32-358.0.1.el6.x86_64.rpm
   i386
     kernel-2.6.32-358.0.1.el6.i686.rpm
     kernel-debug-2.6.32-358.0.1.el6.i686.rpm
     kernel-debug-debuginfo-2.6.32-358.0.1.el6.i686.rpm
     kernel-debug-devel-2.6.32-358.0.1.el6.i686.rpm
     kernel-debuginfo-2.6.32-358.0.1.el6.i686.rpm
     kernel-debuginfo-common-i686-2.6.32-358.0.1.el6.i686.rpm
     kernel-devel-2.6.32-358.0.1.el6.i686.rpm
     kernel-headers-2.6.32-358.0.1.el6.i686.rpm
     perf-2.6.32-358.0.1.el6.i686.rpm
     perf-debuginfo-2.6.32-358.0.1.el6.i686.rpm
     python-perf-debuginfo-2.6.32-358.0.1.el6.i686.rpm
     python-perf-2.6.32-358.0.1.el6.i686.rpm
   noarch
     kernel-doc-2.6.32-358.0.1.el6.noarch.rpm
     kernel-firmware-2.6.32-358.0.1.el6.noarch.rpm

- Scientific Linux Development Team