First published: Thu Nov 04 2010(Updated: )
Description of problem: Sometimes ax25_getname() doesn't initialize all members of fsa_digipeater field of fsa struct. This structure is then copied to userland. It leads to leaking of contents of kernel stack memory. We have to initialize them to zero. Reference: <a href="http://marc.info/?l=linux-netdev&m=128854507120898&w=2">http://marc.info/?l=linux-netdev&m=128854507120898&w=2</a> <a href="http://seclists.org/oss-sec/2010/q4/94">http://seclists.org/oss-sec/2010/q4/94</a> Acknowledgements: Red Hat would like to thank Vasiliy Kulikov of Openwall for reporting this issue.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Linux |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-649713 is classified as medium due to the potential for sensitive data leakage.
To fix REDHAT-BUG-649713, ensure to apply the latest patch provided by Red Hat for the Linux Kernel.
The impact of REDHAT-BUG-649713 includes leaking kernel stack memory contents which could expose sensitive information.
REDHAT-BUG-649713 affects certain versions of the Red Hat Linux Kernel.
Currently, there are no documented workarounds for REDHAT-BUG-649713; applying the patch is recommended.