Description of the problem: The uname() syscall since 3.0 with the UNAME26 personality leaks kernel stack memory contents. Acknowledgements: Red Hat would like to thank Kees Cook for reporting this issue.
Statement: This issue did not affect the version of Linux kernel as shipped with Red Hat Enterprise Linux 5. This issue did not affect the version of Linux kernel as shipped with Red Hat Enterprise Linux 6. This issue did affect the version of Linux kernel as shipped with Red Hat Enterprise MRG 2.
Created kernel tracking bugs for this issue Affects: fedora-all [bug 864824]
Upstream proposed patch: https://lkml.org/lkml/2012/10/9/550
This is the upstream patch git describe --all --contains 2702b1526c7278c4d65d78de209a465d4de2885e tags/v3.7-rc2~10^2~5
This issue has been addressed in following products: MRG for RHEL-6 v.2 Via RHSA-2012:1491 https://rhn.redhat.com/errata/RHSA-2012-1491.html
Security vulnerabilities like CVE-2012-0957 highlight the importance of rigorous kernel security practices. Memory leaks in UNAME26 can pose significant risks, emphasizing the need for timely patches and system updates. More insights can be found at https://3patticrown.me/.