Bug 875374 - (CVE-2012-5517) CVE-2012-5517 kernel: mm/hotplug: failure in propagating hot-added memory to other nodes
CVE-2012-5517 kernel: mm/hotplug: failure in propagating hot-added memory to ...
Status: CLOSED ERRATA
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20120801,repor...
: Security
Depends On: 870350 875382 875383
Blocks: 875376
  Show dependency treegraph
 
Reported: 2012-11-10 16:19 EST by Petr Matousek
Modified: 2015-07-31 06:28 EDT (History)
26 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2013-08-24 09:27:00 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Petr Matousek 2012-11-10 16:19:17 EST
A NULL pointer dereference flaw has been found in the way a new node's hot-added memory is propagated to other nodes zonelists. An unprivileged local user can use this flaw to crash the system.

Upstream fix:
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=08dff7b7d629807dbb1f398c68dd9cd58dd657a1
Comment 2 Petr Matousek 2012-11-10 16:43:55 EST
Created kernel tracking bugs for this issue

Affects: fedora-all [bug 875383]
Comment 3 errata-xmlrpc 2012-12-18 17:36:44 EST
This issue has been addressed in following products:

  Red Hat Enterprise Linux 6

Via RHSA-2012:1580 https://rhn.redhat.com/errata/RHSA-2012-1580.html
Comment 5 Petr Matousek 2013-01-25 03:38:52 EST
Statement:

This issue did affect the versions of the kernel package as shipped with Red Hat Enterprise Linux 6.

This issue did not affect the versions of kernel package as shipped with Red Hat Enterprise Linux 5 and Red Hat Enterprise MRG.

Note You need to log in before you can comment on or make changes to this bug.