The remote Red Hat host is missing one or more security updates.
Updated kernel packages that fix two security issues and several bugs
are now available for Red Hat Enterprise Linux 6.
The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS)
base scores, which give detailed severity ratings, are available for
each vulnerability from the CVE links in the References section.
The kernel packages contain the Linux kernel, the core of any Linux
This update fixes the following security issues :
* A flaw was found in the way the xen_iret() function in the Linux
kernel used the DS (the CPU's Data Segment) register. A local,
unprivileged user in a 32-bit, para-virtualized Xen hypervisor guest
could use this flaw to crash the guest or, potentially, escalate their
privileges. (CVE-2013-0228, Important)
* A flaw was found in the way file permission checks for the
'/dev/cpu/[x]/msr' files were performed in restricted root
environments (for example, when using a capability-based security
model). A local user with the ability to write to these files could
use this flaw to escalate their privileges to kernel level, for
example, by writing to the SYSENTER_EIP_MSR register. (CVE-2013-0268,
The CVE-2013-0228 issue was discovered by Andrew Jones of Red Hat.
This update also fixes several bugs. Documentation for these changes
will be available shortly from the Technical Notes document linked to
in the References section.
Users should upgrade to these updated packages, which contain
backported patches to correct these issues, and fix the bugs noted in
the Technical Notes. The system must be rebooted for this update to
See also :
Update the affected packages.
Risk factor :
Medium / CVSS Base Score : 6.2
CVSS Temporal Score : 5.4
Public Exploit Available : false