Red Hat Customer Portal

Skip to main content

CVE-2010-0003

The print_fatal_signal function in kernel/signal.c in the Linux kernel before 2.6.32.4 on the i386 platform, when print-fatal-signals is enabled, allows local users to discover the contents of arbitrary memory locations by jumping to an address and then reading a log file, and might allow local users to cause a denial of service (system slowdown or crash) by jumping to an address.

Details Source

Mitre

Statement

Red Hat is aware of this issue and is tracking it via the following bug:
https://bugzilla.redhat.com/CVE-2010-0003.

This issue has been rated as having moderate security impact.

A future update in Red Hat Enterprise MRG may address this flaw. This issue was addressed in Red Hat Enterprise Linux 4 and 5 via https://rhn.redhat.com/errata/RHSA-2010-0146.html and https://rhn.redhat.com/errata/RHSA-2010-0147.html respectively.

This issue is not planned to be fixed in Red Hat Enterprise Linux 3, due to this product being in Production 3 of its maintenance life-cycle, where only qualified security errata of important or critical impact are addressed.

For further information about Errata Support Policy, visit: http://www.redhat.com/security/updates/errata/

Public Date

2010-01-08 00:00:00

Impact

Moderate

Bugzilla

CVE-2010-0003 kernel: infoleak if print-fatal-signals=1

Bugzilla ID

554 578

CVSS Status

verified

Base Score

6.60

Base Metrics

AV:L/AC:L/Au:N/C:C/I:N/A:C

IAVA

2011-A-0066

Red Hat Security Errata

Platform Errata Release Date
Red Hat Enterprise Linux 4 (kernel) RHSA-2010:0146 2010-03-17
MRG Grid for RHEL 5 Server (kernel-rt) RHSA-2010:0161 2010-03-23
Red Hat Enterprise Linux 5 (kernel) RHSA-2010:0147 2010-03-17