First published: Fri Jul 31 2009(Updated: )
Description of problem: do_sigaltstack: avoid copying 'stack_t' as a structure to user space Ulrich Drepper correctly points out that there is generally padding in the structure on 64-bit hosts, and that copying the structure from kernel to user space can leak information from the kernel stack in those padding bytes. Avoid the whole issue by just copying the three members one by one instead, which also means that the function also can avoid the need for a stack frame. This also happens to match how we copy the new structure from user space, so it all even makes sense. Upstream commit: <a href="http://git.kernel.org/linus/0083fc2c50e6c5127c2802ad323adf8143ab7856">http://git.kernel.org/linus/0083fc2c50e6c5127c2802ad323adf8143ab7856</a>
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/kernel-rt | <0:2.6.24.7-132.el5 | 0:2.6.24.7-132.el5 |
redhat/kernel | <0:2.6.18-164.el5 | 0:2.6.18-164.el5 |
redhat/kernel | <0:2.6.18-128.8.1.el5 | 0:2.6.18-128.8.1.el5 |
Linux kernel | =2.6.24.7 | |
Linux kernel | =2.6.25.15 | |
Linux Linux kernel | <=2.6.16.31 | |
Linux Linux kernel | =2.6 | |
Linux Linux kernel | =2.6.0 | |
Linux Linux kernel | =2.6.1 | |
Linux Linux kernel | =2.6.10 | |
Linux Linux kernel | =2.6.11 | |
Linux Linux kernel | =2.6.11.1 | |
Linux Linux kernel | =2.6.11.2 | |
Linux Linux kernel | =2.6.11.3 | |
Linux Linux kernel | =2.6.11.4 | |
Linux Linux kernel | =2.6.11.5 | |
Linux Linux kernel | =2.6.11.6 | |
Linux Linux kernel | =2.6.11.7 | |
Linux Linux kernel | =2.6.11.8 | |
Linux Linux kernel | =2.6.11.9 | |
Linux Linux kernel | =2.6.11.10 | |
Linux Linux kernel | =2.6.11.11 | |
Linux Linux kernel | =2.6.11.12 | |
Linux Linux kernel | =2.6.12 | |
Linux Linux kernel | =2.6.12.1 | |
Linux Linux kernel | =2.6.12.2 | |
Linux Linux kernel | =2.6.12.3 | |
Linux Linux kernel | =2.6.12.4 | |
Linux Linux kernel | =2.6.12.5 | |
Linux Linux kernel | =2.6.12.6 | |
Linux Linux kernel | =2.6.13 | |
Linux Linux kernel | =2.6.13.1 | |
Linux Linux kernel | =2.6.13.2 | |
Linux Linux kernel | =2.6.13.3 | |
Linux Linux kernel | =2.6.13.4 | |
Linux Linux kernel | =2.6.13.5 | |
Linux Linux kernel | =2.6.14 | |
Linux Linux kernel | =2.6.14.1 | |
Linux Linux kernel | =2.6.14.2 | |
Linux Linux kernel | =2.6.14.3 | |
Linux Linux kernel | =2.6.14.4 | |
Linux Linux kernel | =2.6.14.5 | |
Linux Linux kernel | =2.6.14.6 | |
Linux Linux kernel | =2.6.14.7 | |
Linux Linux kernel | =2.6.15 | |
Linux Linux kernel | =2.6.15.1 | |
Linux Linux kernel | =2.6.15.2 | |
Linux Linux kernel | =2.6.15.3 | |
Linux Linux kernel | =2.6.15.4 | |
Linux Linux kernel | =2.6.15.5 | |
Linux Linux kernel | =2.6.15.6 | |
Linux Linux kernel | =2.6.15.7 | |
Linux Linux kernel | =2.6.16 | |
Linux Linux kernel | =2.6.16.1 | |
Linux Linux kernel | =2.6.16.2 | |
Linux Linux kernel | =2.6.16.3 | |
Linux Linux kernel | =2.6.16.10 | |
Linux Linux kernel | =2.6.16.11 | |
Linux Linux kernel | =2.6.16.12 | |
Linux Linux kernel | =2.6.16.13 | |
Linux Linux kernel | =2.6.16.14 | |
Linux Linux kernel | =2.6.16.15 | |
Linux Linux kernel | =2.6.16.16 | |
Linux Linux kernel | =2.6.16.17 | |
Linux Linux kernel | =2.6.16.18 | |
Linux Linux kernel | =2.6.16.19 | |
Linux Linux kernel | =2.6.16.20 | |
Linux Linux kernel | =2.6.16.21 | |
Linux Linux kernel | =2.6.16.22 | |
Linux Linux kernel | =2.6.16.23 | |
Linux Linux kernel | =2.6.16.24 | |
Linux Linux kernel | =2.6.16.25 | |
Linux Linux kernel | =2.6.16.26 | |
Linux Linux kernel | =2.6.16.27 | |
Linux Linux kernel | =2.6.16.28 | |
Linux Linux kernel | =2.6.16.29 | |
Linux Linux kernel | =2.6.16.30 | |
Linux Linux kernel | =2.6.16.31 | |
Linux Linux kernel | =2.6.16.31--rc1 | |
Linux Linux kernel | =2.6.16.31--rc2 | |
Linux Linux kernel | =2.6.16.31--rc3 | |
Linux Linux kernel | =2.6.16.31--rc4 | |
Linux Linux |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)