A vulnerability was found in the Linux kernel. There is a char array of size 60 in function tipc_nl_compat_link_dump of file net/tipc/netlink_compat.c, link_info.str. Memory after the NULL byte is not initialized. Sending the whole object out can cause a leak of sensitive info in kernel stack. Upstream bug: https://patchwork.ozlabs.org/patch/629100/ Upstream fix: https://git.kernel.org/cgit/linux/kernel/git/davem/net.git/commit/?id=5d2be1422e02ccd697ccfcd45c85b4a26e6178e2
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 1343338]
kernel-4.4.13-200.fc22 has been pushed to the Fedora 22 stable repository. If problems still persist, please make note of it in this bug report.
kernel-4.5.7-200.fc23 has been pushed to the Fedora 23 stable repository. If problems still persist, please make note of it in this bug report.
kernel-4.5.7-300.fc24 has been pushed to the Fedora 24 stable repository. If problems still persist, please make note of it in this bug report.
Statement: This issue does not affect Red Hat Enterprise Linux 5,6 or 7 kernels as it does not contain the code that has introduced the flaw.