- Home
- CVEs with nessus.description==From+Red+Hat+Security+Advisory+2013%3A0830+%3A%0A%0AUpdated+kernel+packages+that+fix+one+security+issue+are+now+available+for+Red+Hat+Enterprise+Linux+6.%0A%0AThe+Red+Hat+Security+Response+Team+has+rated+this+update+as+having+important+security+impact.+A+Common+Vulnerability+Scoring+System+%28CVSS%29+base+score%2C+which+gives+a+detailed+severity+rating%2C+is+available+from+the+CVE+link+in+the+References+section.%0A%0AThe+kernel+packages+contain+the+Linux+kernel%2C+the+core+of+any+Linux+operating+system.%0A%0AThis+update+fixes+the+following+security+issue+%3A%0A%0A%2A+It+was+found+that+the+Red+Hat+Enterprise+Linux+6.1+kernel+update+%28RHSA-2011%3A0542%29+introduced+an+integer+conversion+issue+in+the+Linux+kernel%27s+Performance+Events+implementation.+This+led+to+a+user-supplied+index+into+the+perf_swevent_enabled+array+not+being+validated+properly%2C+resulting+in+out-of-bounds+kernel+memory+access.+A+local%2C+unprivileged+user+could+use+this+flaw+to+escalate+their+privileges.+%28CVE-2013-2094%2C+Important%29%0A%0AA+public+exploit+that+affects+Red+Hat+Enterprise+Linux+6+is+available.%0A%0ARefer+to+Red+Hat+Knowledge+Solution+373743%2C+linked+to+in+the+References%2C+for+further+information+and+mitigation+instructions+for+users+who+are+unable+to+immediately+apply+this+update.%0A%0AUsers+should+upgrade+to+these+updated+packages%2C+which+contain+a+backported+patch+to+correct+this+issue.+The+system+must+be+rebooted+for+this+update+to+take+effect
Max CVSS | 0 |
Min CVSS | 0 |
Total Count | 2 |
| ID | CVSS | Summary | Last (major) update | Published |
Back to Top
Mark selected
Back to Top