Launchpad has imported 9 comments from the remote bug at
https://bugzilla.redhat.com/show_bug.cgi?id=1373966.

If you reply to an imported comment from within Launchpad, your comment
will be sent to the remote bug automatically. Read more about
Launchpad's inter-bugtracker facilities at
https://help.launchpad.net/InterBugTracking.

------------------------------------------------------------------------
On 2016-09-07T14:48:59+00:00 Adam wrote:

It was found that when gcc stack protector is turned on,
proc_keys_show() can cause a panic due to stack corruption. This happens
because xbuf[] is not big enough to hold a 64-bit timeout rendered as
weeks.

Product bug:

https://bugzilla.redhat.com/show_bug.cgi?id=1373499

Reply at:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1634496/comments/0

------------------------------------------------------------------------
On 2016-09-07T14:49:03+00:00 Adam wrote:

Acknowledgments:

Name: Ondrej Kozina (Red Hat)

Reply at:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1634496/comments/1

------------------------------------------------------------------------
On 2016-09-12T13:40:18+00:00 Vladis wrote:

Statement:

This issue affects the Linux kernel packages as shipped with Red Hat
Enterprise Linux 5. This has been rated as having Moderate security
impact and is not currently planned to be addressed in future updates.
For additional information, refer to the Red Hat Enterprise Linux Life
Cycle: https://access.redhat.com/support/policy/updates/errata/.

This issue affects the Linux kernel packages as shipped with Red Hat
Enterprise Linux 6, 7 and Red Hat Enterprise MRG-2. Future Linux kernel
updates for the respective releases might address this issue.

Reply at:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1634496/comments/2

------------------------------------------------------------------------
On 2016-09-12T13:42:25+00:00 Vladis wrote:

Created attachment 1200212
Fix for buffer overflow in proc_keys_show

Reply at:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1634496/comments/3

------------------------------------------------------------------------
On 2016-10-13T12:31:14+00:00 Vladis wrote:

cve-id CVE-2016-7042 was assigned to this flaw internally by the Red
Hat. please, use it in the public communications regarding this flaw.

Reply at:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1634496/comments/4

------------------------------------------------------------------------
On 2017-03-21T13:14:56+00:00 errata-xmlrpc wrote:

This issue has been addressed in the following products:

  Red Hat Enterprise Linux 6

Via RHSA-2017:0817 https://rhn.redhat.com/errata/RHSA-2017-0817.html

Reply at:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1634496/comments/14

------------------------------------------------------------------------
On 2017-08-01T19:09:29+00:00 errata-xmlrpc wrote:

This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2017:2077 https://access.redhat.com/errata/RHSA-2017:2077

Reply at:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1634496/comments/15

------------------------------------------------------------------------
On 2017-08-02T07:48:19+00:00 errata-xmlrpc wrote:

This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2017:1842 https://access.redhat.com/errata/RHSA-2017:1842

Reply at:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1634496/comments/16

------------------------------------------------------------------------
On 2017-09-06T20:38:04+00:00 errata-xmlrpc wrote:

This issue has been addressed in the following products:

  Red Hat Enterprise MRG 2

Via RHSA-2017:2669 https://access.redhat.com/errata/RHSA-2017:2669

Reply at:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1634496/comments/17


** Changed in: linux
       Status: Unknown => Confirmed

** Changed in: linux
   Importance: Unknown => Medium

** Bug watch added: Red Hat Bugzilla #1373499
   https://bugzilla.redhat.com/show_bug.cgi?id=1373499

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2016-7042

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1634496

Title:
  proc_keys_show crash when reading /proc/keys

To manage notifications about this bug go to:
https://bugs.launchpad.net/linux/+bug/1634496/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to