First published: Wed Oct 03 2012(Updated: )
Description of the problem: The uname() syscall since 3.0 with the UNAME26 personality leaks kernel stack memory contents. Acknowledgements: Red Hat would like to thank Kees Cook for reporting this issue.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Linux | >=3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
REDHAT-BUG-862877 is considered a medium severity vulnerability due to its potential to leak sensitive kernel stack memory contents.
To fix REDHAT-BUG-862877, you should update your Red Hat Linux Kernel to a version that contains the patch addressing this vulnerability.
REDHAT-BUG-862877 affects all Red Hat Linux Kernel versions from 3.0 onwards.
Exploiting REDHAT-BUG-862877 may allow an attacker to access sensitive information stored in kernel stack memory.
REDHAT-BUG-862877 was reported by Kees Cook.