Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2013-0871

Опубликовано: 15 фев. 2013
Источник: redhat
CVSS2: 6.2
EPSS Низкий

Описание

Race condition in the ptrace functionality in the Linux kernel before 3.7.5 allows local users to gain privileges via a PTRACE_SETREGS ptrace system call in a crafted application, as demonstrated by ptrace_death.

Отчет

This issue did affect the versions of the kernel package as shipped with Red Hat Enterprise Linux 5, 6 and Red Hat Enterprise MRG 2. Future updates may address this issue. Please note that while a public non-weaponized exploit exists, according to our testing the issue is very hard to hit.

Дополнительная информация

Статус:

Important
https://bugzilla.redhat.com/show_bug.cgi?id=911937kernel: race condition with PTRACE_SETREGS

EPSS

Процентиль: 17%
0.00056
Низкий

6.2 Medium

CVSS2

Связанные уязвимости

ubuntu
почти 13 лет назад

Race condition in the ptrace functionality in the Linux kernel before 3.7.5 allows local users to gain privileges via a PTRACE_SETREGS ptrace system call in a crafted application, as demonstrated by ptrace_death.

nvd
почти 13 лет назад

Race condition in the ptrace functionality in the Linux kernel before 3.7.5 allows local users to gain privileges via a PTRACE_SETREGS ptrace system call in a crafted application, as demonstrated by ptrace_death.

debian
почти 13 лет назад

Race condition in the ptrace functionality in the Linux kernel before ...

github
больше 3 лет назад

Race condition in the ptrace functionality in the Linux kernel before 3.7.5 allows local users to gain privileges via a PTRACE_SETREGS ptrace system call in a crafted application, as demonstrated by ptrace_death.

oracle-oval
почти 13 лет назад

ELSA-2013-0567: kernel security update (IMPORTANT)

EPSS

Процентиль: 17%
0.00056
Низкий

6.2 Medium

CVSS2