Red Hat Customer Portal

Skip to main content


The print_fatal_signal function in kernel/signal.c in the Linux kernel before on the i386 platform, when print-fatal-signals is enabled, allows local users to discover the contents of arbitrary memory locations by jumping to an address and then reading a log file, and might allow local users to cause a denial of service (system slowdown or crash) by jumping to an address.

Details Source



Red Hat is aware of this issue and is tracking it via the following bug:

This issue has been rated as having moderate security impact.

A future update in Red Hat Enterprise MRG may address this flaw. This issue was addressed in Red Hat Enterprise Linux 4 and 5 via and respectively.

This issue is not planned to be fixed in Red Hat Enterprise Linux 3, due to this product being in Production 3 of its maintenance life-cycle, where only qualified security errata of important or critical impact are addressed.

For further information about Errata Support Policy, visit:

Public Date

2010-01-08 00:00:00




CVE-2010-0003 kernel: infoleak if print-fatal-signals=1

Bugzilla ID

554 578

CVSS Status


Base Score


Base Metrics




Red Hat Security Errata

Platform Errata Release Date
Red Hat Enterprise Linux 4 (kernel) RHSA-2010:0146 2010-03-17
MRG Grid for RHEL 5 Server (kernel-rt) RHSA-2010:0161 2010-03-23
Red Hat Enterprise Linux 5 (kernel) RHSA-2010:0147 2010-03-17