Linux kernel built with the The Transparent Inter Process Communication (CONFIG_TIPC) protocol support is vulnerable to an information leakage flaw. It occurs while receiving messages via recvmsg(2) socket call. A user/program could use this flaw to leak kernel memory bytes. Upstream fix: ------------- -> http://git.kernel.org/linus/60085c3d009b0df252547adb336d1ccca5ce52ec Reference: ---------- -> www.openwall.com/lists/oss-security/2013/04/14/3
Statement: This issue does not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 6 and Red Hat Enterprise MRG 2. This issue affects the version of the kernel package as shipped with Red Hat Enterprise Linux 5. Future kernel updates for Red Hat Enterprise Linux 5 may address this issue.
This issue has been addressed in following products: Red Hat Enterprise Linux 5 Via RHSA-2013:1034 https://rhn.redhat.com/errata/RHSA-2013-1034.html