Synopsis: Important: kernel security update Issue Date: 2013-02-26 CVE Numbers: CVE-2013-0871 -- This update fixes the following security issue: * A race condition was found in the way the Linux kernel's ptrace implementation handled PTRACE_SETREGS requests when the debuggee was woken due to a SIGKILL signal instead of being stopped. A local, unprivileged user could use this flaw to escalate their privileges. (CVE-2013-0871, Important) The system must be rebooted for this update to take effect. -- SL6 x86_64 kernel-2.6.32-358.0.1.el6.x86_64.rpm kernel-debug-2.6.32-358.0.1.el6.x86_64.rpm kernel-debug-debuginfo-2.6.32-358.0.1.el6.x86_64.rpm kernel-debug-devel-2.6.32-358.0.1.el6.x86_64.rpm kernel-debuginfo-2.6.32-358.0.1.el6.x86_64.rpm kernel-debuginfo-common-x86_64-2.6.32-358.0.1.el6.x86_64.rpm kernel-devel-2.6.32-358.0.1.el6.x86_64.rpm kernel-headers-2.6.32-358.0.1.el6.x86_64.rpm perf-2.6.32-358.0.1.el6.x86_64.rpm perf-debuginfo-2.6.32-358.0.1.el6.x86_64.rpm python-perf-debuginfo-2.6.32-358.0.1.el6.x86_64.rpm python-perf-2.6.32-358.0.1.el6.x86_64.rpm i386 kernel-2.6.32-358.0.1.el6.i686.rpm kernel-debug-2.6.32-358.0.1.el6.i686.rpm kernel-debug-debuginfo-2.6.32-358.0.1.el6.i686.rpm kernel-debug-devel-2.6.32-358.0.1.el6.i686.rpm kernel-debuginfo-2.6.32-358.0.1.el6.i686.rpm kernel-debuginfo-common-i686-2.6.32-358.0.1.el6.i686.rpm kernel-devel-2.6.32-358.0.1.el6.i686.rpm kernel-headers-2.6.32-358.0.1.el6.i686.rpm perf-2.6.32-358.0.1.el6.i686.rpm perf-debuginfo-2.6.32-358.0.1.el6.i686.rpm python-perf-debuginfo-2.6.32-358.0.1.el6.i686.rpm python-perf-2.6.32-358.0.1.el6.i686.rpm noarch kernel-doc-2.6.32-358.0.1.el6.noarch.rpm kernel-firmware-2.6.32-358.0.1.el6.noarch.rpm - Scientific Linux Development Team