Bug 99514 - Various kernel security issues affect Enterprise Linux kernel
Various kernel security issues affect Enterprise Linux kernel
Product: Red Hat Enterprise Linux 2.1
Classification: Red Hat
Component: kernel (Show other bugs)
All Linux
medium Severity medium
: ---
: ---
Assigned To: Jason Baron
Brian Brock
: Security
Depends On:
  Show dependency treegraph
Reported: 2003-07-21 09:59 EDT by Mark J. Cox
Modified: 2013-03-06 00:55 EST (History)
2 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Last Closed: 2003-08-21 13:40:46 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)

External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2003:198 normal SHIPPED_LIVE Important: kernel security update 2003-08-21 00:00:00 EDT
Red Hat Product Errata RHSA-2003:239 normal SHIPPED_LIVE Important: kernel security update 2003-08-21 00:00:00 EDT

  None (edit)
Description Mark J. Cox 2003-07-21 09:59:10 EDT
A number of issues have recently been fixed in Red Hat Linux:

CAN-2003-0461: /proc/tty/driver/serial reveals the exact character counts
for serial links. This could be used by a local attacker to infer password
lengths and inter-keystroke timings during password entry.

CAN-2003-0462: Paul Starzetz discovered a file read race condition existing
in the execve() system call, which could cause a local crash.

CAN-2003-0476: The execve system call in Linux 2.4.x records the file
descriptor of the executable process in the file table of the calling
process, allowing local users to gain read access to restricted file

CAN-2003-0501: The /proc filesystem in Linux allows local users to obtain
sensitive information by opening various entries in /proc/self before
executing a setuid program. This causes the program to fail to change the
ownership and permissions of already opened entries.

CAN-2003-0550: The STP protocol is known to have no security, which could
allow attackers to alter the bridge topology. STP is now turned off by

CAN-2003-0551: STP input processing was lax in its length checking, which
could lead to a denial of service.

CAN-2003-0552: Jerry Kreuscher discovered that the Forwarding table could
be spoofed by sending forged packets with bogus source addresses the same
as the local host.
Comment 2 Mark J. Cox 2003-08-13 06:29:51 EDT

CAN-2003-0619: An integer signedness error in the decode_fh function of
nfs3xdr.c allows remote attackers to cause a denial of service (kernel
panic) via a negative size value within XDR data of an NFSv3 procedure call. 

Errata, RHSA-2003:239 is in progress.
Comment 3 Mark J. Cox 2003-08-13 07:11:48 EDT
Removing CAN-2003-0461 from the list of things that need to be fixed as 
a fix for CAN-2003-0461 is already in all kernels shipped with 2.1 WS and 2.1 ES
and a fix for 2.1AS was introduced by RHSA-2002:263 errata.  
Comment 4 Mark J. Cox 2003-08-21 13:40:46 EDT
An errata has been issued which should help the problem described in this bug report. 
This report is therefore being closed with a resolution of ERRATA. For more information
on the solution and/or where to find the updated files, please follow the link below. You may reopen 
this bug report if the solution does not work for you.


Note You need to log in before you can comment on or make changes to this bug.