An issue was discovered in the proc_pid_stack function in fs/proc/base.c in the Linux kernel . An attacker with a local account can trick the stack unwinder code to leak stack contents to userspace. The fix allows only root may inspect the kernel stack of an arbitrary task. Upstream patch: https://marc.info/?l=linux-fsdevel&m=153806242024956&w=2
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 1636352]
kernel-4.18.13-100.fc27, kernel-headers-4.18.13-100.fc27, kernel-tools-4.18.13-100.fc27 has been pushed to the Fedora 27 stable repository. If problems still persist, please make note of it in this bug report.
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2019:0514 https://access.redhat.com/errata/RHSA-2019:0514
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2019:0512 https://access.redhat.com/errata/RHSA-2019:0512
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2019:0831 https://access.redhat.com/errata/RHSA-2019:0831
This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Via RHSA-2019:2473 https://access.redhat.com/errata/RHSA-2019:2473