Bug 862877 (CVE-2012-0957) - CVE-2012-0957 kernel: uts: stack memory leak in UNAME26
Summary: CVE-2012-0957 kernel: uts: stack memory leak in UNAME26
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2012-0957
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 862881 864822 864824
Blocks: 862886
TreeView+ depends on / blocked
 
Reported: 2012-10-03 19:58 UTC by Petr Matousek
Modified: 2019-09-29 12:55 UTC (History)
9 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2013-08-24 13:25:52 UTC


Attachments (Terms of Use)


Links
System ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2012:1491 normal SHIPPED_LIVE Important: kernel-rt security and bug fix update 2012-12-05 00:50:25 UTC

Description Petr Matousek 2012-10-03 19:58:06 UTC
Description of the problem:
The uname() syscall since 3.0 with the UNAME26 personality leaks kernel
stack memory contents.

Acknowledgements:

Red Hat would like to thank Kees Cook for reporting this issue.

Comment 4 Petr Matousek 2012-10-03 20:09:57 UTC
Statement:

This issue did not affect the version of Linux kernel as shipped with Red Hat Enterprise Linux 5.

This issue did not affect the version of Linux kernel as shipped with Red Hat Enterprise Linux 6.

This issue did affect the version of Linux kernel as shipped with Red Hat Enterprise MRG 2.

Comment 6 Petr Matousek 2012-10-10 08:11:18 UTC
Created kernel tracking bugs for this issue

Affects: fedora-all [bug 864824]

Comment 7 Petr Matousek 2012-10-10 08:12:33 UTC
Upstream proposed patch:

https://lkml.org/lkml/2012/10/9/550

Comment 8 John Kacur 2012-11-06 11:12:07 UTC
This is the upstream patch
git describe --all --contains 2702b1526c7278c4d65d78de209a465d4de2885e
tags/v3.7-rc2~10^2~5

Comment 9 errata-xmlrpc 2012-12-04 19:59:18 UTC
This issue has been addressed in following products:

  MRG for RHEL-6 v.2

Via RHSA-2012:1491 https://rhn.redhat.com/errata/RHSA-2012-1491.html


Note You need to log in before you can comment on or make changes to this bug.