Linux kernel which supports tkill/tgkill routines is vulnerable to an information leakage flaw. It occurs when routine tkill(2) or tgkill(2) is used send signal to thread. A user/program could use this flaw to leak kernel memory bytes. Upstream fix: ------------- -> https://git.kernel.org/linus/b9e146d8eb3b9ecae5086d373b50fa0c1f3e7f0f Reference: ---------- -> http://www.openwall.com/lists/oss-security/2013/06/02/1
Statement: (none)
This issue has been addressed in following products: MRG for RHEL-6 v.2 Via RHSA-2013:1264 https://rhn.redhat.com/errata/RHSA-2013-1264.html
This issue has been addressed in following products: Red Hat Enterprise Linux 5 Via RHSA-2013:1292 https://rhn.redhat.com/errata/RHSA-2013-1292.html
This issue has been addressed in following products: Red Hat Enterprise Linux 6 Via RHSA-2013:1801 https://rhn.redhat.com/errata/RHSA-2013-1801.html