Bug 648658 - (CVE-2010-4073) CVE-2010-4073 kernel: ipc/compat*.c: reading uninitialized stack memory
CVE-2010-4073 kernel: ipc/compat*.c: reading uninitialized stack memory
Status: NEW
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
Unspecified Unspecified
low Severity low
: ---
: ---
Assigned To: Red Hat Product Security
public=20101006,reported=20101007,sou...
: Security
Depends On: 648691 648692 648693 648694 648695 648810 648811
Blocks:
  Show dependency treegraph
 
Reported: 2010-11-01 17:15 EDT by Petr Matousek
Modified: 2016-05-22 19:36 EDT (History)
16 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed:
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:


Attachments (Terms of Use)

  None (edit)
Description Petr Matousek 2010-11-01 17:15:19 EDT
Description of problem:
The compat ipc functions allow unprivileged users to read uninitialized stack memory, because some of the structures used and declared on the stack are not altered or zeroed before being copied back to the user.

Reference:
http://www.openwall.com/lists/oss-security/2010/10/07/1
http://lkml.org/lkml/2010/10/6/492

Acknowledgements:

Red Hat would like to thank Dan Rosenberg for reporting this issue.
Comment 3 Petr Matousek 2010-11-02 06:38:21 EDT
Statement:

This issue did not affect the version of Linux kernel as shipped with Red Hat
Enterprise Linux 3 as it did not include IPC compat functionality.
Comment 4 Eugene Teo (Security Response) 2010-11-22 00:38:06 EST
Upstream commit:
http://git.kernel.org/linus/03145beb455cf5c20a761e8451e30b8a74ba58d9
Comment 5 Kyle McMartin 2010-11-23 10:06:48 EST
Thanks, grabbing this fix for Fedora as it doesn't seem to have made it into the stable series.
Comment 8 errata-xmlrpc 2010-12-08 14:09:51 EST
This issue has been addressed in following products:

  MRG for RHEL-5

Via RHSA-2010:0958 https://rhn.redhat.com/errata/RHSA-2010-0958.html
Comment 9 errata-xmlrpc 2011-01-11 14:46:20 EST
This issue has been addressed in following products:

  Red Hat Enterprise Linux 6

Via RHSA-2011:0007 https://rhn.redhat.com/errata/RHSA-2011-0007.html
Comment 10 errata-xmlrpc 2011-01-13 16:58:58 EST
This issue has been addressed in following products:

  Red Hat Enterprise Linux 5

Via RHSA-2011:0017 https://rhn.redhat.com/errata/RHSA-2011-0017.html
Comment 11 errata-xmlrpc 2011-01-14 04:02:54 EST
This issue has been addressed in following products:

  Red Hat Enterprise Linux 5

Via RHSA-2011:0017 https://rhn.redhat.com/errata/RHSA-2011-0017.html
Comment 12 errata-xmlrpc 2011-01-18 12:45:38 EST
This issue has been addressed in following products:

  Red Hat Enterprise Linux 4

Via RHSA-2011:0162 https://rhn.redhat.com/errata/RHSA-2011-0162.html

Note You need to log in before you can comment on or make changes to this bug.