Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2003-0127 (GCVE-0-2003-0127)
Vulnerability from cvelistv5
Published
2003-03-18 05:00
Modified
2024-08-08 01:43
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The kernel module loader in Linux kernel 2.2.x before 2.2.25, and 2.4.x before 2.4.21, allows local users to gain root privileges by using ptrace to attach to a child process that is spawned by the kernel.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T01:43:35.912Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2003:103", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2003-103.html" }, { "name": "RHSA-2003:088", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2003-088.html" }, { "name": "DSA-270", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2003/dsa-270" }, { "name": "DSA-423", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2004/dsa-423" }, { "name": "RHSA-2003:098", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2003-098.html" }, { "name": "DSA-336", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2003/dsa-336" }, { "name": "CSSA-2003-020.0", "tags": [ "vendor-advisory", "x_refsource_CALDERA", "x_transferred" ], "url": "ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2003-020.0.txt" }, { "name": "DSA-276", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2003/dsa-276" }, { "name": "ESA-20030515-017", "tags": [ "vendor-advisory", "x_refsource_ENGARDE", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=105301461726555\u0026w=2" }, { "name": "MDKSA-2003:039", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:039" }, { "name": "DSA-495", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2004/dsa-495" }, { "name": "GLSA-200303-17", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-200303-17.xml" }, { "name": "DSA-311", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2003/dsa-311" }, { "name": "DSA-332", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2003/dsa-332" }, { "name": "20030317 Fwd: Ptrace hole / Linux 2.2.25", "tags": [ "mailing-list", "x_refsource_VULNWATCH", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0134.html" }, { "name": "oval:org.mitre.oval:def:254", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A254" }, { "name": "RHSA-2003:145", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2003-145.html" }, { "name": "MDKSA-2003:038", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:038" }, { "name": "DSA-312", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2003/dsa-312" }, { "name": "VU#628849", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/628849" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2003-03-17T00:00:00", "descriptions": [ { "lang": "en", "value": "The kernel module loader in Linux kernel 2.2.x before 2.2.25, and 2.4.x before 2.4.21, allows local users to gain root privileges by using ptrace to attach to a child process that is spawned by the kernel." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-10T00:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "RHSA-2003:103", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2003-103.html" }, { "name": "RHSA-2003:088", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2003-088.html" }, { "name": "DSA-270", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2003/dsa-270" }, { "name": "DSA-423", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2004/dsa-423" }, { "name": "RHSA-2003:098", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2003-098.html" }, { "name": "DSA-336", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2003/dsa-336" }, { "name": "CSSA-2003-020.0", "tags": [ "vendor-advisory", "x_refsource_CALDERA" ], "url": "ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2003-020.0.txt" }, { "name": "DSA-276", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2003/dsa-276" }, { "name": "ESA-20030515-017", "tags": [ "vendor-advisory", "x_refsource_ENGARDE" ], "url": "http://marc.info/?l=bugtraq\u0026m=105301461726555\u0026w=2" }, { "name": "MDKSA-2003:039", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:039" }, { "name": "DSA-495", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2004/dsa-495" }, { "name": "GLSA-200303-17", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-200303-17.xml" }, { "name": "DSA-311", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2003/dsa-311" }, { "name": "DSA-332", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2003/dsa-332" }, { "name": "20030317 Fwd: Ptrace hole / Linux 2.2.25", "tags": [ "mailing-list", "x_refsource_VULNWATCH" ], "url": "http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0134.html" }, { "name": "oval:org.mitre.oval:def:254", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A254" }, { "name": "RHSA-2003:145", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2003-145.html" }, { "name": "MDKSA-2003:038", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:038" }, { "name": "DSA-312", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2003/dsa-312" }, { "name": "VU#628849", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/628849" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2003-0127", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The kernel module loader in Linux kernel 2.2.x before 2.2.25, and 2.4.x before 2.4.21, allows local users to gain root privileges by using ptrace to attach to a child process that is spawned by the kernel." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2003:103", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2003-103.html" }, { "name": "RHSA-2003:088", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2003-088.html" }, { "name": "DSA-270", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2003/dsa-270" }, { "name": "DSA-423", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2004/dsa-423" }, { "name": "RHSA-2003:098", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2003-098.html" }, { "name": "DSA-336", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2003/dsa-336" }, { "name": "CSSA-2003-020.0", "refsource": "CALDERA", "url": "ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2003-020.0.txt" }, { "name": "DSA-276", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2003/dsa-276" }, { "name": "ESA-20030515-017", "refsource": "ENGARDE", "url": "http://marc.info/?l=bugtraq\u0026m=105301461726555\u0026w=2" }, { "name": "MDKSA-2003:039", "refsource": "MANDRAKE", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:039" }, { "name": "DSA-495", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2004/dsa-495" }, { "name": "GLSA-200303-17", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200303-17.xml" }, { "name": "DSA-311", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2003/dsa-311" }, { "name": "DSA-332", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2003/dsa-332" }, { "name": "20030317 Fwd: Ptrace hole / Linux 2.2.25", "refsource": "VULNWATCH", "url": "http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0134.html" }, { "name": "oval:org.mitre.oval:def:254", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A254" }, { "name": "RHSA-2003:145", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2003-145.html" }, { "name": "MDKSA-2003:038", "refsource": "MANDRAKE", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:038" }, { "name": "DSA-312", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2003/dsa-312" }, { "name": "VU#628849", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/628849" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2003-0127", "datePublished": "2003-03-18T05:00:00", "dateReserved": "2003-03-13T00:00:00", "dateUpdated": "2024-08-08T01:43:35.912Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2003-0127\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2003-03-31T05:00:00.000\",\"lastModified\":\"2025-04-03T01:03:51.193\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The kernel module loader in Linux kernel 2.2.x before 2.2.25, and 2.4.x before 2.4.21, allows local users to gain root privileges by using ptrace to attach to a child process that is spawned by the kernel.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":7.2,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":3.9,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":true,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"146F7A77-A950-4CAD-BDA9-C239696F569D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD7A6B55-2F3B-422E-B1F2-80B482FE89AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"70DCE8FF-40C3-44F7-8185-0422ADDA051B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7DAC3A7C-2092-46D4-908B-CF03F4217112\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"956B7F2F-DE46-492F-ACA3-BD5EE7EA14F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE77B8D6-EF2A-4EC2-AF75-B6FA48747781\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.2.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AAEC8651-9291-4CAE-AA49-C1CA4C7AE450\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.2.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A6F3945-21ED-44C6-86D2-B7755A87014E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.2.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4919EB3-625C-4D83-8DCB-72BCF05DF2C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.2.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5DDB008-E88E-473C-B030-AF9B6F5E4E48\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.2.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA3D3E03-0ABE-4325-AD67-BA8EA16B6DBE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.2.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E48C9A9-B7E6-4314-BCEF-8013BBB4276E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.2.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0EEF4480-D50B-464C-AE39-A12455DBC99F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.2.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6BBFD0DB-0A18-4545-9B4B-697AAC11E9C5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.2.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"15928E10-7D41-45B2-87D6-8AA10190A8EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.2.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C18E13C4-F42D-4168-B25E-544E1549C46B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.2.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0DB9B7C-3608-44E3-AE47-D231D1F7B8EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.2.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4947CDE-CB89-456B-8B5F-0E17B46BC893\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.2.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6ECB42B3-70C6-4019-8B8B-8EB7A84B39AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.2.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF701E58-35E8-4DDE-B832-C5A23E61A3CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.2.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C122CC4-B8CB-4AB9-8571-6F3D302F56A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.2.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2498D898-D243-4D0C-9AEF-0138D19A68B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.2.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3924060B-1EC1-4003-B306-E327634E7797\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.2.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D45B43DF-FD4C-4C37-9569-1CCE450B8987\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.2.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99879B2B-7FFB-4181-8928-13B7E17F36C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C24A129D-2E5E-436C-95DE-AE75D2E8D092\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"55B85D5B-4EA1-4FCF-8D50-9C54E8FDA92F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"01408EC0-9C2D-4A44-8080-D7FC7E1A1FA1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F49A384-7222-41F3-9BE1-4E18C00E50A6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"05520FE3-C48D-42E8-BC24-C2396BD46CBA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D865FBB6-E07D-492F-A75E-168B06C8ADEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"598F24C2-0366-4799-865C-5EE4572B734B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0399660-6385-45AB-9785-E504D8788146\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DCBC50EA-130C-41B7-83EA-C523B3C3AAD7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B91F6CBE-400F-4D0B-B893-34577B47A342\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1548ECFD-FCB5-4AE0-9788-42F61F25489F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6ABB9787-5497-4BDC-8952-F99CF60A89BD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"615F6BA2-CD51-4159-B28A-A018CA9FC25C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"093848CB-68A1-4258-8357-373A477FE4E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E275F440-A427-465F-B314-BF0730C781DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98651D39-60CF-409F-8276-DBBB56B972AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"067B8E09-C923-4DDA-92DB-4A2892CB526A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9EBE3738-E530-4EC6-9FC6-1A063605BE05\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"474384F1-FB2D-4C00-A4CD-0C2C5AE42DB4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F677E992-8D37-438F-97DF-9D98B28F020C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"476687F9-722B-490C-BD0B-B5F2CD7891DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.4.21:pre1:*:*:*:*:*:*\",\"matchCriteriaId\":\"8EEBFBB4-CC06-40D2-8DE9-22E82DBEFADA\"}]}]}],\"references\":[{\"url\":\"ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2003-020.0.txt\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0134.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=105301461726555\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2003-088.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2003-098.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://security.gentoo.org/glsa/glsa-200303-17.xml\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2003/dsa-270\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2003/dsa-276\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2003/dsa-311\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2003/dsa-312\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2003/dsa-332\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2003/dsa-336\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2004/dsa-423\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2004/dsa-495\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.kb.cert.org/vuls/id/628849\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2003:038\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2003:039\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2003-103.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2003-145.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A254\",\"source\":\"cve@mitre.org\"},{\"url\":\"ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2003-020.0.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0134.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=105301461726555\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2003-088.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2003-098.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://security.gentoo.org/glsa/glsa-200303-17.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2003/dsa-270\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2003/dsa-276\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2003/dsa-311\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2003/dsa-312\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2003/dsa-332\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2003/dsa-336\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2004/dsa-423\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2004/dsa-495\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.kb.cert.org/vuls/id/628849\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2003:038\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2003:039\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2003-103.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2003-145.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A254\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
rhsa-2003_145
Vulnerability from csaf_redhat
Published
2003-05-27 18:52
Modified
2024-11-21 22:44
Summary
Red Hat Security Advisory: Updated kernel fixes security vulnerabilities and updates drivers
Notes
Topic
These updated kernel packages address security vulnerabilites, including a
potential data corruption scenario. In addition, a number of drivers have
been updated, bugs have been resolved, and support for the IBM x450 platform
and the Madison processor have been added.
Details
The Linux kernel handles the basic functions of the operating system.
A ptrace-related vulnerability has been discovered that could allow a local
user to gain elevated (root) privileges without authorization. The Common
Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name
CAN-2003-0127 to this issue.
A flaw has been discovered that could potentially lead to data corruption.
The scenario only occurs while performing memory mapped file I/O, where
the file is simultaneously unlinked and the corresponding file blocks
reallocated. Furthermore, the memory mapped must be to a partial page at
the end of a file on an ext3 file system. As such, Red Hat considers this
scenario unlikely.
A flaw has been found in several hash table implementations in the kernel
networking code. A remote attacker could send packets with carefully
chosen, forged source addresses in such a way as to make every routing
cache entry get hashed into the same hash chain. The result would be that
the kernel would use a disproportionate amount of processor time to deal
with new packets, resulting in a remote denial of service attack. The
Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned
the name CAN-2003-0244 to this issue.
In addition, the following drivers have been updated to the version indicated:
- e1000: 4.4.19-k1
- e100: 2.1.29-k2
- ips: 6.00.26
- qla2100, qla2200, qla2300: v6.04.01
- tg3 driver to 1.4c
- cciss driver to 2.4.44
- mpt fusion: 2.05.00
- aic7xxx to 6.2.32
- aic79xx to 1.3.6
If the system is configured to use alternate drivers, we recommend applying
the kudzu errata RHEA-2003:132 prior to updating the kernel.
The updated kernel also adds support for the IBM x450 platform and the
Madison processor, and incorporates improved support for the hugetlb file
system. This file system makes efficient use of the large page size
support that the Itanium architecture provides.
All users should upgrade to these errata packages, which address these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "These updated kernel packages address security vulnerabilites, including a\npotential data corruption scenario. In addition, a number of drivers have\nbeen updated, bugs have been resolved, and support for the IBM x450 platform\nand the Madison processor have been added.", "title": "Topic" }, { "category": "general", "text": "The Linux kernel handles the basic functions of the operating system.\n\nA ptrace-related vulnerability has been discovered that could allow a local\nuser to gain elevated (root) privileges without authorization. The Common\nVulnerabilities and Exposures project (cve.mitre.org) has assigned the name\nCAN-2003-0127 to this issue.\n\nA flaw has been discovered that could potentially lead to data corruption.\n The scenario only occurs while performing memory mapped file I/O, where\nthe file is simultaneously unlinked and the corresponding file blocks\nreallocated. Furthermore, the memory mapped must be to a partial page at\nthe end of a file on an ext3 file system. As such, Red Hat considers this\nscenario unlikely.\n\nA flaw has been found in several hash table implementations in the kernel\nnetworking code. A remote attacker could send packets with carefully\nchosen, forged source addresses in such a way as to make every routing\ncache entry get hashed into the same hash chain. The result would be that\nthe kernel would use a disproportionate amount of processor time to deal\nwith new packets, resulting in a remote denial of service attack. The\nCommon Vulnerabilities and Exposures project (cve.mitre.org) has assigned\nthe name CAN-2003-0244 to this issue.\n\nIn addition, the following drivers have been updated to the version indicated:\n\n- e1000: 4.4.19-k1\n- e100: 2.1.29-k2\n- ips: 6.00.26\n- qla2100, qla2200, qla2300: v6.04.01\n- tg3 driver to 1.4c\n- cciss driver to 2.4.44\n- mpt fusion: 2.05.00\n- aic7xxx to 6.2.32\n- aic79xx to 1.3.6\n\nIf the system is configured to use alternate drivers, we recommend applying\nthe kudzu errata RHEA-2003:132 prior to updating the kernel.\n\nThe updated kernel also adds support for the IBM x450 platform and the\nMadison processor, and incorporates improved support for the hugetlb file\nsystem. This file system makes efficient use of the large page size\nsupport that the Itanium architecture provides. \n\nAll users should upgrade to these errata packages, which address these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2003:145", "url": "https://access.redhat.com/errata/RHSA-2003:145" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2003/rhsa-2003_145.json" } ], "title": "Red Hat Security Advisory: Updated kernel fixes security vulnerabilities and updates drivers", "tracking": { "current_release_date": "2024-11-21T22:44:49+00:00", "generator": { "date": "2024-11-21T22:44:49+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2003:145", "initial_release_date": "2003-05-27T18:52:00+00:00", "revision_history": [ { "date": "2003-05-27T18:52:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2003-05-27T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-21T22:44:49+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product": { "name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::as" } } }, { "category": "product_name", "name": "Red Hat Linux Advanced Workstation 2.1", "product": { "name": "Red Hat Linux Advanced Workstation 2.1", "product_id": "Red Hat Linux Advanced Workstation 2.1", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::aw" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2003-0127", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616970" } ], "notes": [ { "category": "description", "text": "The kernel module loader in Linux kernel 2.2.x before 2.2.25, and 2.4.x before 2.4.21, allows local users to gain root privileges by using ptrace to attach to a child process that is spawned by the kernel.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2003-0127" }, { "category": "external", "summary": "RHBZ#1616970", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616970" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2003-0127", "url": "https://www.cve.org/CVERecord?id=CVE-2003-0127" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2003-0127", "url": "https://nvd.nist.gov/vuln/detail/CVE-2003-0127" } ], "release_date": "2003-03-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-05-27T18:52:00+00:00", "details": "Release notes, driver notes, and driver disks for this update are available\nat the following URL:\n\nhttp://www.redhat.com/support/errata/rhel/\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied, especially the additional\npackages from RHSA-2002:205 and RHSA-2002:206 respectively.\n\nThe procedure for upgrading the kernel manually is documented at:\n\nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the kernel\nexplicitly on default configurations of up2date.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2003:145" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2003-0244", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617005" } ], "notes": [ { "category": "description", "text": "The route cache implementation in Linux 2.4, and the Netfilter IP conntrack module, allows remote attackers to cause a denial of service (CPU consumption) via packets with forged source addresses that cause a large number of hash table collisions.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2003-0244" }, { "category": "external", "summary": "RHBZ#1617005", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617005" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2003-0244", "url": "https://www.cve.org/CVERecord?id=CVE-2003-0244" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2003-0244", "url": "https://nvd.nist.gov/vuln/detail/CVE-2003-0244" } ], "release_date": "2003-04-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-05-27T18:52:00+00:00", "details": "Release notes, driver notes, and driver disks for this update are available\nat the following URL:\n\nhttp://www.redhat.com/support/errata/rhel/\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied, especially the additional\npackages from RHSA-2002:205 and RHSA-2002:206 respectively.\n\nThe procedure for upgrading the kernel manually is documented at:\n\nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the kernel\nexplicitly on default configurations of up2date.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2003:145" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" } ] }
RHSA-2003:190
Vulnerability from csaf_redhat
Published
2003-06-25 17:45
Modified
2025-09-10 13:35
Summary
Red Hat Security Advisory: : : : Updated 2.4 kernel for pSeries and iSeries fixes vulnerabilities
Notes
Topic
Updated kernel packages, based on the 2.4.18 kernel, are now available for
Red Hat Linux 7.1 for iSeries and pSeries systems.
Please see the NOTE at the end of the description for important information
about booting the new kernel on your system.
Details
The Linux kernel handles the basic functions of the operating system.
A number of security issues have been found which affect the version of the
Linux kernel shipped for iSeries and pSeries systems:
Al Viro found a security issue in the tty layer whereby any user could
cause a kernel oops. The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the name CAN-2002-0247 to this issue.
Multiple Ethernet Network Interface Card (NIC) device drivers do not pad
frames with null bytes. This allows remote attackers to obtain information
from previous packets or kernel memory by using malformed packets. The
Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned
the name CAN-2003-0001 to this issue.
The kernel module loader allows local users to gain root privileges by
using ptrace to attach to a child process that is spawned by the kernel.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the name CAN-2003-0127 to this issue.
A flaw has been found in several hash table implementations in the kernel
networking code. A remote attacker could send packets with carefully
chosen, forged source addresses in such a way as to make every routing
cache entry get hashed into the same hash chain. The result would be that
the kernel would use a disproportionate amount of processor time to deal
with new packets, resulting in a remote denial of service attack. The
Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned
the names CAN-2003-0244 and CAN-2003-0364 to these issues.
NOTE: Installing the kernel RPMs will not automatically prepare the system
to boot the new kernel. Refer to the following sections for the appropriate
instructions to boot the new kernel on your machine.
Preparing to boot the new kernel on iSeries:
After the kernel RPM is installed, the new kernel image file is
/boot/vmlinux. This is a link to the /boot/vmlinux-"version" file (where
"version" is the new kernel's version-release).
Use the installkernel.iSeries command to load the new kernel image into the
"side" from which you want to boot. For instance, to boot from the C side,
use the command:
installkernel.iSeries C /boot/vmlinux
Preparing to boot the new kernel on pSeries:
After the kernel RPM is installed, the new kernel image file is
/boot/vmlinux. This is a link to the /boot/vmlinux-"version" file (where
"version" is the new kernel's version-release).
Edit the /etc/yaboot.conf file to instruct YABOOT to boot the new
kernel. Add a new stanza or change the existing stanza to point to
the new kernel image file. The yaboot.conf man page has detailed
information about the format of the yaboot configuration file.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel packages, based on the 2.4.18 kernel, are now available for\nRed Hat Linux 7.1 for iSeries and pSeries systems.\n\nPlease see the NOTE at the end of the description for important information\nabout booting the new kernel on your system.", "title": "Topic" }, { "category": "general", "text": "The Linux kernel handles the basic functions of the operating system.\n\nA number of security issues have been found which affect the version of the\nLinux kernel shipped for iSeries and pSeries systems:\n\nAl Viro found a security issue in the tty layer whereby any user could\ncause a kernel oops. The Common Vulnerabilities and Exposures project\n(cve.mitre.org) has assigned the name CAN-2002-0247 to this issue.\n\nMultiple Ethernet Network Interface Card (NIC) device drivers do not pad\nframes with null bytes. This allows remote attackers to obtain information\nfrom previous packets or kernel memory by using malformed packets. The\nCommon Vulnerabilities and Exposures project (cve.mitre.org) has assigned\nthe name CAN-2003-0001 to this issue.\n\nThe kernel module loader allows local users to gain root privileges by\nusing ptrace to attach to a child process that is spawned by the kernel.\nThe Common Vulnerabilities and Exposures project (cve.mitre.org) has\nassigned the name CAN-2003-0127 to this issue.\n\nA flaw has been found in several hash table implementations in the kernel\nnetworking code. A remote attacker could send packets with carefully\nchosen, forged source addresses in such a way as to make every routing\ncache entry get hashed into the same hash chain. The result would be that\nthe kernel would use a disproportionate amount of processor time to deal\nwith new packets, resulting in a remote denial of service attack. The\nCommon Vulnerabilities and Exposures project (cve.mitre.org) has assigned\nthe names CAN-2003-0244 and CAN-2003-0364 to these issues.\n\nNOTE: Installing the kernel RPMs will not automatically prepare the system\nto boot the new kernel. Refer to the following sections for the appropriate\ninstructions to boot the new kernel on your machine.\n\nPreparing to boot the new kernel on iSeries:\n\nAfter the kernel RPM is installed, the new kernel image file is\n/boot/vmlinux. This is a link to the /boot/vmlinux-\"version\" file (where\n\"version\" is the new kernel\u0027s version-release).\n\nUse the installkernel.iSeries command to load the new kernel image into the\n\"side\" from which you want to boot. For instance, to boot from the C side,\nuse the command:\n\ninstallkernel.iSeries C /boot/vmlinux\n\nPreparing to boot the new kernel on pSeries:\n\nAfter the kernel RPM is installed, the new kernel image file is\n/boot/vmlinux. This is a link to the /boot/vmlinux-\"version\" file (where\n\"version\" is the new kernel\u0027s version-release).\n\nEdit the /etc/yaboot.conf file to instruct YABOOT to boot the new\nkernel. Add a new stanza or change the existing stanza to point to\nthe new kernel image file. The yaboot.conf man page has detailed\ninformation about the format of the yaboot configuration file.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2003:190", "url": "https://access.redhat.com/errata/RHSA-2003:190" }, { "category": "external", "summary": "79910", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=79910" }, { "category": "external", "summary": "79911", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=79911" }, { "category": "external", "summary": "79912", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=79912" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2003/rhsa-2003_190.json" } ], "title": "Red Hat Security Advisory: : : : Updated 2.4 kernel for pSeries and iSeries fixes vulnerabilities", "tracking": { "current_release_date": "2025-09-10T13:35:40+00:00", "generator": { "date": "2025-09-10T13:35:40+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.7" } }, "id": "RHSA-2003:190", "initial_release_date": "2003-06-25T17:45:00+00:00", "revision_history": [ { "date": "2003-06-25T17:45:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2003-06-25T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-09-10T13:35:40+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Linux 7.1", "product": { "name": "Red Hat Linux 7.1", "product_id": "Red Hat Linux 7.1", "product_identification_helper": { "cpe": "cpe:/o:redhat:linux:7.1" } } } ], "category": "product_family", "name": "Red Hat Linux" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2003-0001", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2003-01-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616933" } ], "notes": [ { "category": "description", "text": "Multiple ethernet Network Interface Card (NIC) device drivers do not pad frames with null bytes, which allows remote attackers to obtain information from previous packets or kernel memory by using malformed packets, as demonstrated by Etherleak.", "title": "Vulnerability description" }, { "category": "summary", "text": "cisco: information leak in ethernet frames.", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Linux 7.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2003-0001" }, { "category": "external", "summary": "RHBZ#1616933", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616933" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2003-0001", "url": "https://www.cve.org/CVERecord?id=CVE-2003-0001" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2003-0001", "url": "https://nvd.nist.gov/vuln/detail/CVE-2003-0001" } ], "release_date": "2003-01-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-06-25T17:45:00+00:00", "details": "NOTE: Installing the kernel rpms does not automatically prepare the system\nto boot the new kernel. Refer to the Problem Description section for\nspecific instructions.\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the kernel\nexplicitly on default configurations of up2date.", "product_ids": [ "Red Hat Linux 7.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2003:190" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "Red Hat Linux 7.1" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "cisco: information leak in ethernet frames." }, { "cve": "CVE-2003-0127", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616970" } ], "notes": [ { "category": "description", "text": "The kernel module loader in Linux kernel 2.2.x before 2.2.25, and 2.4.x before 2.4.21, allows local users to gain root privileges by using ptrace to attach to a child process that is spawned by the kernel.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Linux 7.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2003-0127" }, { "category": "external", "summary": "RHBZ#1616970", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616970" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2003-0127", "url": "https://www.cve.org/CVERecord?id=CVE-2003-0127" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2003-0127", "url": "https://nvd.nist.gov/vuln/detail/CVE-2003-0127" } ], "release_date": "2003-03-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-06-25T17:45:00+00:00", "details": "NOTE: Installing the kernel rpms does not automatically prepare the system\nto boot the new kernel. Refer to the Problem Description section for\nspecific instructions.\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the kernel\nexplicitly on default configurations of up2date.", "product_ids": [ "Red Hat Linux 7.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2003:190" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2003-0244", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617005" } ], "notes": [ { "category": "description", "text": "The route cache implementation in Linux 2.4, and the Netfilter IP conntrack module, allows remote attackers to cause a denial of service (CPU consumption) via packets with forged source addresses that cause a large number of hash table collisions.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Linux 7.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2003-0244" }, { "category": "external", "summary": "RHBZ#1617005", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617005" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2003-0244", "url": "https://www.cve.org/CVERecord?id=CVE-2003-0244" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2003-0244", "url": "https://nvd.nist.gov/vuln/detail/CVE-2003-0244" } ], "release_date": "2003-04-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-06-25T17:45:00+00:00", "details": "NOTE: Installing the kernel rpms does not automatically prepare the system\nto boot the new kernel. Refer to the Problem Description section for\nspecific instructions.\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the kernel\nexplicitly on default configurations of up2date.", "product_ids": [ "Red Hat Linux 7.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2003:190" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2003-0247", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617008" } ], "notes": [ { "category": "description", "text": "Unknown vulnerability in the TTY layer of the Linux kernel 2.4 allows attackers to cause a denial of service (\"kernel oops\").", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Linux 7.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2003-0247" }, { "category": "external", "summary": "RHBZ#1617008", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617008" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2003-0247", "url": "https://www.cve.org/CVERecord?id=CVE-2003-0247" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2003-0247", "url": "https://nvd.nist.gov/vuln/detail/CVE-2003-0247" } ], "release_date": "2003-06-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-06-25T17:45:00+00:00", "details": "NOTE: Installing the kernel rpms does not automatically prepare the system\nto boot the new kernel. Refer to the Problem Description section for\nspecific instructions.\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the kernel\nexplicitly on default configurations of up2date.", "product_ids": [ "Red Hat Linux 7.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2003:190" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2003-0364", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617022" } ], "notes": [ { "category": "description", "text": "The TCP/IP fragment reassembly handling in the Linux kernel 2.4 allows remote attackers to cause a denial of service (CPU consumption) via certain packets that cause a large number of hash table collisions.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Linux 7.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2003-0364" }, { "category": "external", "summary": "RHBZ#1617022", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617022" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2003-0364", "url": "https://www.cve.org/CVERecord?id=CVE-2003-0364" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2003-0364", "url": "https://nvd.nist.gov/vuln/detail/CVE-2003-0364" } ], "release_date": "2003-06-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-06-25T17:45:00+00:00", "details": "NOTE: Installing the kernel rpms does not automatically prepare the system\nto boot the new kernel. Refer to the Problem Description section for\nspecific instructions.\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the kernel\nexplicitly on default configurations of up2date.", "product_ids": [ "Red Hat Linux 7.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2003:190" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" } ] }
rhsa-2003:088
Vulnerability from csaf_redhat
Published
2003-03-20 08:56
Modified
2025-09-10 13:35
Summary
Red Hat Security Advisory: : New kernel 2.2 packages fix vulnerabilities
Notes
Topic
Updated kernel packages for Red Hat Linux 6.2 and 7.0 are now available
that fix several security vulnerabilities.
Details
The Linux kernel handles the basic functions of the operating system.
A bug in the kernel module loader code allows a local user to gain root
privileges. The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the name CAN-2003-0127 to this issue.
Multiple ethernet Network Interface Card (NIC) device drivers do not pad
frames with null bytes, which allows remote attackers to obtain information
from previous packets or kernel memory by using malformed packets. The
Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned
the name CAN-2003-0001 to this issue.
The Linux 2.2 kernel allows local users to cause a denial of service
(crash) by using the mmap() function with a PROT_READ parameter to access
non-readable memory pages through the /proc/pid/mem interface. The
Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned
the name CAN-2002-1380 to this issue.
All users of Red Hat Linux 6.2 and 7 should upgrade to these errata
packages, which contain version 2.2.24 of the Linux kernel with patches and
are not vulnerable to these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel packages for Red Hat Linux 6.2 and 7.0 are now available\nthat fix several security vulnerabilities.", "title": "Topic" }, { "category": "general", "text": "The Linux kernel handles the basic functions of the operating system.\n\nA bug in the kernel module loader code allows a local user to gain root \nprivileges. The Common Vulnerabilities and Exposures project\n(cve.mitre.org) has assigned the name CAN-2003-0127 to this issue.\n\nMultiple ethernet Network Interface Card (NIC) device drivers do not pad\nframes with null bytes, which allows remote attackers to obtain information\nfrom previous packets or kernel memory by using malformed packets. The\nCommon Vulnerabilities and Exposures project (cve.mitre.org) has assigned\nthe name CAN-2003-0001 to this issue.\n\nThe Linux 2.2 kernel allows local users to cause a denial of service\n(crash) by using the mmap() function with a PROT_READ parameter to access\nnon-readable memory pages through the /proc/pid/mem interface. The\nCommon Vulnerabilities and Exposures project (cve.mitre.org) has assigned\nthe name CAN-2002-1380 to this issue.\n\nAll users of Red Hat Linux 6.2 and 7 should upgrade to these errata\npackages, which contain version 2.2.24 of the Linux kernel with patches and\nare not vulnerable to these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2003:088", "url": "https://access.redhat.com/errata/RHSA-2003:088" }, { "category": "external", "summary": "http://www.atstake.com/research/advisories/2003/a010603-1.txt", "url": "http://www.atstake.com/research/advisories/2003/a010603-1.txt" }, { "category": "external", "summary": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=104033054204316", "url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=104033054204316" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2003/rhsa-2003_088.json" } ], "title": "Red Hat Security Advisory: : New kernel 2.2 packages fix vulnerabilities", "tracking": { "current_release_date": "2025-09-10T13:35:26+00:00", "generator": { "date": "2025-09-10T13:35:26+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.7" } }, "id": "RHSA-2003:088", "initial_release_date": "2003-03-20T08:56:00+00:00", "revision_history": [ { "date": "2003-03-20T08:56:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2003-03-20T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-09-10T13:35:26+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Linux 6.2", "product": { "name": "Red Hat Linux 6.2", "product_id": "Red Hat Linux 6.2", "product_identification_helper": { "cpe": "cpe:/o:redhat:linux:6.2" } } }, { "category": "product_name", "name": "Red Hat Linux 7.0", "product": { "name": "Red Hat Linux 7.0", "product_id": "Red Hat Linux 7.0", "product_identification_helper": { "cpe": "cpe:/o:redhat:linux:7.0" } } } ], "category": "product_family", "name": "Red Hat Linux" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2002-1380", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616901" } ], "notes": [ { "category": "description", "text": "Linux kernel 2.2.x allows local users to cause a denial of service (crash) by using the mmap() function with a PROT_READ parameter to access non-readable memory pages through the /proc/pid/mem interface.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Linux 6.2", "Red Hat Linux 7.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2002-1380" }, { "category": "external", "summary": "RHBZ#1616901", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616901" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2002-1380", "url": "https://www.cve.org/CVERecord?id=CVE-2002-1380" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2002-1380", "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-1380" } ], "release_date": "2002-12-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-03-20T08:56:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied. \n\nThe procedure for upgrading the kernel is documented at:\n\nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/kernel-upgrade.html\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the kernel\nexplicitly on default configurations of up2date.", "product_ids": [ "Red Hat Linux 6.2", "Red Hat Linux 7.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2003:088" } ], "title": "security flaw" }, { "cve": "CVE-2003-0001", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2003-01-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616933" } ], "notes": [ { "category": "description", "text": "Multiple ethernet Network Interface Card (NIC) device drivers do not pad frames with null bytes, which allows remote attackers to obtain information from previous packets or kernel memory by using malformed packets, as demonstrated by Etherleak.", "title": "Vulnerability description" }, { "category": "summary", "text": "cisco: information leak in ethernet frames.", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Linux 6.2", "Red Hat Linux 7.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2003-0001" }, { "category": "external", "summary": "RHBZ#1616933", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616933" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2003-0001", "url": "https://www.cve.org/CVERecord?id=CVE-2003-0001" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2003-0001", "url": "https://nvd.nist.gov/vuln/detail/CVE-2003-0001" } ], "release_date": "2003-01-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-03-20T08:56:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied. \n\nThe procedure for upgrading the kernel is documented at:\n\nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/kernel-upgrade.html\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the kernel\nexplicitly on default configurations of up2date.", "product_ids": [ "Red Hat Linux 6.2", "Red Hat Linux 7.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2003:088" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "Red Hat Linux 6.2", "Red Hat Linux 7.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "cisco: information leak in ethernet frames." }, { "cve": "CVE-2003-0127", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616970" } ], "notes": [ { "category": "description", "text": "The kernel module loader in Linux kernel 2.2.x before 2.2.25, and 2.4.x before 2.4.21, allows local users to gain root privileges by using ptrace to attach to a child process that is spawned by the kernel.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Linux 6.2", "Red Hat Linux 7.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2003-0127" }, { "category": "external", "summary": "RHBZ#1616970", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616970" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2003-0127", "url": "https://www.cve.org/CVERecord?id=CVE-2003-0127" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2003-0127", "url": "https://nvd.nist.gov/vuln/detail/CVE-2003-0127" } ], "release_date": "2003-03-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-03-20T08:56:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied. \n\nThe procedure for upgrading the kernel is documented at:\n\nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/kernel-upgrade.html\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the kernel\nexplicitly on default configurations of up2date.", "product_ids": [ "Red Hat Linux 6.2", "Red Hat Linux 7.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2003:088" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" } ] }
rhsa-2003:145
Vulnerability from csaf_redhat
Published
2003-05-27 18:52
Modified
2025-09-10 13:35
Summary
Red Hat Security Advisory: Updated kernel fixes security vulnerabilities and updates drivers
Notes
Topic
These updated kernel packages address security vulnerabilites, including a
potential data corruption scenario. In addition, a number of drivers have
been updated, bugs have been resolved, and support for the IBM x450 platform
and the Madison processor have been added.
Details
The Linux kernel handles the basic functions of the operating system.
A ptrace-related vulnerability has been discovered that could allow a local
user to gain elevated (root) privileges without authorization. The Common
Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name
CAN-2003-0127 to this issue.
A flaw has been discovered that could potentially lead to data corruption.
The scenario only occurs while performing memory mapped file I/O, where
the file is simultaneously unlinked and the corresponding file blocks
reallocated. Furthermore, the memory mapped must be to a partial page at
the end of a file on an ext3 file system. As such, Red Hat considers this
scenario unlikely.
A flaw has been found in several hash table implementations in the kernel
networking code. A remote attacker could send packets with carefully
chosen, forged source addresses in such a way as to make every routing
cache entry get hashed into the same hash chain. The result would be that
the kernel would use a disproportionate amount of processor time to deal
with new packets, resulting in a remote denial of service attack. The
Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned
the name CAN-2003-0244 to this issue.
In addition, the following drivers have been updated to the version indicated:
- e1000: 4.4.19-k1
- e100: 2.1.29-k2
- ips: 6.00.26
- qla2100, qla2200, qla2300: v6.04.01
- tg3 driver to 1.4c
- cciss driver to 2.4.44
- mpt fusion: 2.05.00
- aic7xxx to 6.2.32
- aic79xx to 1.3.6
If the system is configured to use alternate drivers, we recommend applying
the kudzu errata RHEA-2003:132 prior to updating the kernel.
The updated kernel also adds support for the IBM x450 platform and the
Madison processor, and incorporates improved support for the hugetlb file
system. This file system makes efficient use of the large page size
support that the Itanium architecture provides.
All users should upgrade to these errata packages, which address these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "These updated kernel packages address security vulnerabilites, including a\npotential data corruption scenario. In addition, a number of drivers have\nbeen updated, bugs have been resolved, and support for the IBM x450 platform\nand the Madison processor have been added.", "title": "Topic" }, { "category": "general", "text": "The Linux kernel handles the basic functions of the operating system.\n\nA ptrace-related vulnerability has been discovered that could allow a local\nuser to gain elevated (root) privileges without authorization. The Common\nVulnerabilities and Exposures project (cve.mitre.org) has assigned the name\nCAN-2003-0127 to this issue.\n\nA flaw has been discovered that could potentially lead to data corruption.\n The scenario only occurs while performing memory mapped file I/O, where\nthe file is simultaneously unlinked and the corresponding file blocks\nreallocated. Furthermore, the memory mapped must be to a partial page at\nthe end of a file on an ext3 file system. As such, Red Hat considers this\nscenario unlikely.\n\nA flaw has been found in several hash table implementations in the kernel\nnetworking code. A remote attacker could send packets with carefully\nchosen, forged source addresses in such a way as to make every routing\ncache entry get hashed into the same hash chain. The result would be that\nthe kernel would use a disproportionate amount of processor time to deal\nwith new packets, resulting in a remote denial of service attack. The\nCommon Vulnerabilities and Exposures project (cve.mitre.org) has assigned\nthe name CAN-2003-0244 to this issue.\n\nIn addition, the following drivers have been updated to the version indicated:\n\n- e1000: 4.4.19-k1\n- e100: 2.1.29-k2\n- ips: 6.00.26\n- qla2100, qla2200, qla2300: v6.04.01\n- tg3 driver to 1.4c\n- cciss driver to 2.4.44\n- mpt fusion: 2.05.00\n- aic7xxx to 6.2.32\n- aic79xx to 1.3.6\n\nIf the system is configured to use alternate drivers, we recommend applying\nthe kudzu errata RHEA-2003:132 prior to updating the kernel.\n\nThe updated kernel also adds support for the IBM x450 platform and the\nMadison processor, and incorporates improved support for the hugetlb file\nsystem. This file system makes efficient use of the large page size\nsupport that the Itanium architecture provides. \n\nAll users should upgrade to these errata packages, which address these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2003:145", "url": "https://access.redhat.com/errata/RHSA-2003:145" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2003/rhsa-2003_145.json" } ], "title": "Red Hat Security Advisory: Updated kernel fixes security vulnerabilities and updates drivers", "tracking": { "current_release_date": "2025-09-10T13:35:34+00:00", "generator": { "date": "2025-09-10T13:35:34+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.7" } }, "id": "RHSA-2003:145", "initial_release_date": "2003-05-27T18:52:00+00:00", "revision_history": [ { "date": "2003-05-27T18:52:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2003-05-27T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-09-10T13:35:34+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product": { "name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::as" } } }, { "category": "product_name", "name": "Red Hat Linux Advanced Workstation 2.1", "product": { "name": "Red Hat Linux Advanced Workstation 2.1", "product_id": "Red Hat Linux Advanced Workstation 2.1", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::aw" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2003-0127", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616970" } ], "notes": [ { "category": "description", "text": "The kernel module loader in Linux kernel 2.2.x before 2.2.25, and 2.4.x before 2.4.21, allows local users to gain root privileges by using ptrace to attach to a child process that is spawned by the kernel.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2003-0127" }, { "category": "external", "summary": "RHBZ#1616970", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616970" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2003-0127", "url": "https://www.cve.org/CVERecord?id=CVE-2003-0127" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2003-0127", "url": "https://nvd.nist.gov/vuln/detail/CVE-2003-0127" } ], "release_date": "2003-03-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-05-27T18:52:00+00:00", "details": "Release notes, driver notes, and driver disks for this update are available\nat the following URL:\n\nhttp://www.redhat.com/support/errata/rhel/\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied, especially the additional\npackages from RHSA-2002:205 and RHSA-2002:206 respectively.\n\nThe procedure for upgrading the kernel manually is documented at:\n\nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the kernel\nexplicitly on default configurations of up2date.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2003:145" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2003-0244", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617005" } ], "notes": [ { "category": "description", "text": "The route cache implementation in Linux 2.4, and the Netfilter IP conntrack module, allows remote attackers to cause a denial of service (CPU consumption) via packets with forged source addresses that cause a large number of hash table collisions.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2003-0244" }, { "category": "external", "summary": "RHBZ#1617005", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617005" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2003-0244", "url": "https://www.cve.org/CVERecord?id=CVE-2003-0244" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2003-0244", "url": "https://nvd.nist.gov/vuln/detail/CVE-2003-0244" } ], "release_date": "2003-04-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-05-27T18:52:00+00:00", "details": "Release notes, driver notes, and driver disks for this update are available\nat the following URL:\n\nhttp://www.redhat.com/support/errata/rhel/\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied, especially the additional\npackages from RHSA-2002:205 and RHSA-2002:206 respectively.\n\nThe procedure for upgrading the kernel manually is documented at:\n\nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the kernel\nexplicitly on default configurations of up2date.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2003:145" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" } ] }
RHSA-2003:088
Vulnerability from csaf_redhat
Published
2003-03-20 08:56
Modified
2025-09-10 13:35
Summary
Red Hat Security Advisory: : New kernel 2.2 packages fix vulnerabilities
Notes
Topic
Updated kernel packages for Red Hat Linux 6.2 and 7.0 are now available
that fix several security vulnerabilities.
Details
The Linux kernel handles the basic functions of the operating system.
A bug in the kernel module loader code allows a local user to gain root
privileges. The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the name CAN-2003-0127 to this issue.
Multiple ethernet Network Interface Card (NIC) device drivers do not pad
frames with null bytes, which allows remote attackers to obtain information
from previous packets or kernel memory by using malformed packets. The
Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned
the name CAN-2003-0001 to this issue.
The Linux 2.2 kernel allows local users to cause a denial of service
(crash) by using the mmap() function with a PROT_READ parameter to access
non-readable memory pages through the /proc/pid/mem interface. The
Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned
the name CAN-2002-1380 to this issue.
All users of Red Hat Linux 6.2 and 7 should upgrade to these errata
packages, which contain version 2.2.24 of the Linux kernel with patches and
are not vulnerable to these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel packages for Red Hat Linux 6.2 and 7.0 are now available\nthat fix several security vulnerabilities.", "title": "Topic" }, { "category": "general", "text": "The Linux kernel handles the basic functions of the operating system.\n\nA bug in the kernel module loader code allows a local user to gain root \nprivileges. The Common Vulnerabilities and Exposures project\n(cve.mitre.org) has assigned the name CAN-2003-0127 to this issue.\n\nMultiple ethernet Network Interface Card (NIC) device drivers do not pad\nframes with null bytes, which allows remote attackers to obtain information\nfrom previous packets or kernel memory by using malformed packets. The\nCommon Vulnerabilities and Exposures project (cve.mitre.org) has assigned\nthe name CAN-2003-0001 to this issue.\n\nThe Linux 2.2 kernel allows local users to cause a denial of service\n(crash) by using the mmap() function with a PROT_READ parameter to access\nnon-readable memory pages through the /proc/pid/mem interface. The\nCommon Vulnerabilities and Exposures project (cve.mitre.org) has assigned\nthe name CAN-2002-1380 to this issue.\n\nAll users of Red Hat Linux 6.2 and 7 should upgrade to these errata\npackages, which contain version 2.2.24 of the Linux kernel with patches and\nare not vulnerable to these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2003:088", "url": "https://access.redhat.com/errata/RHSA-2003:088" }, { "category": "external", "summary": "http://www.atstake.com/research/advisories/2003/a010603-1.txt", "url": "http://www.atstake.com/research/advisories/2003/a010603-1.txt" }, { "category": "external", "summary": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=104033054204316", "url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=104033054204316" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2003/rhsa-2003_088.json" } ], "title": "Red Hat Security Advisory: : New kernel 2.2 packages fix vulnerabilities", "tracking": { "current_release_date": "2025-09-10T13:35:26+00:00", "generator": { "date": "2025-09-10T13:35:26+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.7" } }, "id": "RHSA-2003:088", "initial_release_date": "2003-03-20T08:56:00+00:00", "revision_history": [ { "date": "2003-03-20T08:56:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2003-03-20T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-09-10T13:35:26+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Linux 6.2", "product": { "name": "Red Hat Linux 6.2", "product_id": "Red Hat Linux 6.2", "product_identification_helper": { "cpe": "cpe:/o:redhat:linux:6.2" } } }, { "category": "product_name", "name": "Red Hat Linux 7.0", "product": { "name": "Red Hat Linux 7.0", "product_id": "Red Hat Linux 7.0", "product_identification_helper": { "cpe": "cpe:/o:redhat:linux:7.0" } } } ], "category": "product_family", "name": "Red Hat Linux" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2002-1380", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616901" } ], "notes": [ { "category": "description", "text": "Linux kernel 2.2.x allows local users to cause a denial of service (crash) by using the mmap() function with a PROT_READ parameter to access non-readable memory pages through the /proc/pid/mem interface.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Linux 6.2", "Red Hat Linux 7.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2002-1380" }, { "category": "external", "summary": "RHBZ#1616901", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616901" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2002-1380", "url": "https://www.cve.org/CVERecord?id=CVE-2002-1380" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2002-1380", "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-1380" } ], "release_date": "2002-12-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-03-20T08:56:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied. \n\nThe procedure for upgrading the kernel is documented at:\n\nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/kernel-upgrade.html\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the kernel\nexplicitly on default configurations of up2date.", "product_ids": [ "Red Hat Linux 6.2", "Red Hat Linux 7.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2003:088" } ], "title": "security flaw" }, { "cve": "CVE-2003-0001", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2003-01-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616933" } ], "notes": [ { "category": "description", "text": "Multiple ethernet Network Interface Card (NIC) device drivers do not pad frames with null bytes, which allows remote attackers to obtain information from previous packets or kernel memory by using malformed packets, as demonstrated by Etherleak.", "title": "Vulnerability description" }, { "category": "summary", "text": "cisco: information leak in ethernet frames.", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Linux 6.2", "Red Hat Linux 7.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2003-0001" }, { "category": "external", "summary": "RHBZ#1616933", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616933" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2003-0001", "url": "https://www.cve.org/CVERecord?id=CVE-2003-0001" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2003-0001", "url": "https://nvd.nist.gov/vuln/detail/CVE-2003-0001" } ], "release_date": "2003-01-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-03-20T08:56:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied. \n\nThe procedure for upgrading the kernel is documented at:\n\nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/kernel-upgrade.html\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the kernel\nexplicitly on default configurations of up2date.", "product_ids": [ "Red Hat Linux 6.2", "Red Hat Linux 7.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2003:088" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "Red Hat Linux 6.2", "Red Hat Linux 7.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "cisco: information leak in ethernet frames." }, { "cve": "CVE-2003-0127", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616970" } ], "notes": [ { "category": "description", "text": "The kernel module loader in Linux kernel 2.2.x before 2.2.25, and 2.4.x before 2.4.21, allows local users to gain root privileges by using ptrace to attach to a child process that is spawned by the kernel.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Linux 6.2", "Red Hat Linux 7.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2003-0127" }, { "category": "external", "summary": "RHBZ#1616970", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616970" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2003-0127", "url": "https://www.cve.org/CVERecord?id=CVE-2003-0127" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2003-0127", "url": "https://nvd.nist.gov/vuln/detail/CVE-2003-0127" } ], "release_date": "2003-03-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-03-20T08:56:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied. \n\nThe procedure for upgrading the kernel is documented at:\n\nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/kernel-upgrade.html\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the kernel\nexplicitly on default configurations of up2date.", "product_ids": [ "Red Hat Linux 6.2", "Red Hat Linux 7.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2003:088" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" } ] }
rhsa-2003:190
Vulnerability from csaf_redhat
Published
2003-06-25 17:45
Modified
2025-09-10 13:35
Summary
Red Hat Security Advisory: : : : Updated 2.4 kernel for pSeries and iSeries fixes vulnerabilities
Notes
Topic
Updated kernel packages, based on the 2.4.18 kernel, are now available for
Red Hat Linux 7.1 for iSeries and pSeries systems.
Please see the NOTE at the end of the description for important information
about booting the new kernel on your system.
Details
The Linux kernel handles the basic functions of the operating system.
A number of security issues have been found which affect the version of the
Linux kernel shipped for iSeries and pSeries systems:
Al Viro found a security issue in the tty layer whereby any user could
cause a kernel oops. The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the name CAN-2002-0247 to this issue.
Multiple Ethernet Network Interface Card (NIC) device drivers do not pad
frames with null bytes. This allows remote attackers to obtain information
from previous packets or kernel memory by using malformed packets. The
Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned
the name CAN-2003-0001 to this issue.
The kernel module loader allows local users to gain root privileges by
using ptrace to attach to a child process that is spawned by the kernel.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the name CAN-2003-0127 to this issue.
A flaw has been found in several hash table implementations in the kernel
networking code. A remote attacker could send packets with carefully
chosen, forged source addresses in such a way as to make every routing
cache entry get hashed into the same hash chain. The result would be that
the kernel would use a disproportionate amount of processor time to deal
with new packets, resulting in a remote denial of service attack. The
Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned
the names CAN-2003-0244 and CAN-2003-0364 to these issues.
NOTE: Installing the kernel RPMs will not automatically prepare the system
to boot the new kernel. Refer to the following sections for the appropriate
instructions to boot the new kernel on your machine.
Preparing to boot the new kernel on iSeries:
After the kernel RPM is installed, the new kernel image file is
/boot/vmlinux. This is a link to the /boot/vmlinux-"version" file (where
"version" is the new kernel's version-release).
Use the installkernel.iSeries command to load the new kernel image into the
"side" from which you want to boot. For instance, to boot from the C side,
use the command:
installkernel.iSeries C /boot/vmlinux
Preparing to boot the new kernel on pSeries:
After the kernel RPM is installed, the new kernel image file is
/boot/vmlinux. This is a link to the /boot/vmlinux-"version" file (where
"version" is the new kernel's version-release).
Edit the /etc/yaboot.conf file to instruct YABOOT to boot the new
kernel. Add a new stanza or change the existing stanza to point to
the new kernel image file. The yaboot.conf man page has detailed
information about the format of the yaboot configuration file.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel packages, based on the 2.4.18 kernel, are now available for\nRed Hat Linux 7.1 for iSeries and pSeries systems.\n\nPlease see the NOTE at the end of the description for important information\nabout booting the new kernel on your system.", "title": "Topic" }, { "category": "general", "text": "The Linux kernel handles the basic functions of the operating system.\n\nA number of security issues have been found which affect the version of the\nLinux kernel shipped for iSeries and pSeries systems:\n\nAl Viro found a security issue in the tty layer whereby any user could\ncause a kernel oops. The Common Vulnerabilities and Exposures project\n(cve.mitre.org) has assigned the name CAN-2002-0247 to this issue.\n\nMultiple Ethernet Network Interface Card (NIC) device drivers do not pad\nframes with null bytes. This allows remote attackers to obtain information\nfrom previous packets or kernel memory by using malformed packets. The\nCommon Vulnerabilities and Exposures project (cve.mitre.org) has assigned\nthe name CAN-2003-0001 to this issue.\n\nThe kernel module loader allows local users to gain root privileges by\nusing ptrace to attach to a child process that is spawned by the kernel.\nThe Common Vulnerabilities and Exposures project (cve.mitre.org) has\nassigned the name CAN-2003-0127 to this issue.\n\nA flaw has been found in several hash table implementations in the kernel\nnetworking code. A remote attacker could send packets with carefully\nchosen, forged source addresses in such a way as to make every routing\ncache entry get hashed into the same hash chain. The result would be that\nthe kernel would use a disproportionate amount of processor time to deal\nwith new packets, resulting in a remote denial of service attack. The\nCommon Vulnerabilities and Exposures project (cve.mitre.org) has assigned\nthe names CAN-2003-0244 and CAN-2003-0364 to these issues.\n\nNOTE: Installing the kernel RPMs will not automatically prepare the system\nto boot the new kernel. Refer to the following sections for the appropriate\ninstructions to boot the new kernel on your machine.\n\nPreparing to boot the new kernel on iSeries:\n\nAfter the kernel RPM is installed, the new kernel image file is\n/boot/vmlinux. This is a link to the /boot/vmlinux-\"version\" file (where\n\"version\" is the new kernel\u0027s version-release).\n\nUse the installkernel.iSeries command to load the new kernel image into the\n\"side\" from which you want to boot. For instance, to boot from the C side,\nuse the command:\n\ninstallkernel.iSeries C /boot/vmlinux\n\nPreparing to boot the new kernel on pSeries:\n\nAfter the kernel RPM is installed, the new kernel image file is\n/boot/vmlinux. This is a link to the /boot/vmlinux-\"version\" file (where\n\"version\" is the new kernel\u0027s version-release).\n\nEdit the /etc/yaboot.conf file to instruct YABOOT to boot the new\nkernel. Add a new stanza or change the existing stanza to point to\nthe new kernel image file. The yaboot.conf man page has detailed\ninformation about the format of the yaboot configuration file.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2003:190", "url": "https://access.redhat.com/errata/RHSA-2003:190" }, { "category": "external", "summary": "79910", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=79910" }, { "category": "external", "summary": "79911", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=79911" }, { "category": "external", "summary": "79912", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=79912" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2003/rhsa-2003_190.json" } ], "title": "Red Hat Security Advisory: : : : Updated 2.4 kernel for pSeries and iSeries fixes vulnerabilities", "tracking": { "current_release_date": "2025-09-10T13:35:40+00:00", "generator": { "date": "2025-09-10T13:35:40+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.7" } }, "id": "RHSA-2003:190", "initial_release_date": "2003-06-25T17:45:00+00:00", "revision_history": [ { "date": "2003-06-25T17:45:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2003-06-25T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-09-10T13:35:40+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Linux 7.1", "product": { "name": "Red Hat Linux 7.1", "product_id": "Red Hat Linux 7.1", "product_identification_helper": { "cpe": "cpe:/o:redhat:linux:7.1" } } } ], "category": "product_family", "name": "Red Hat Linux" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2003-0001", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2003-01-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616933" } ], "notes": [ { "category": "description", "text": "Multiple ethernet Network Interface Card (NIC) device drivers do not pad frames with null bytes, which allows remote attackers to obtain information from previous packets or kernel memory by using malformed packets, as demonstrated by Etherleak.", "title": "Vulnerability description" }, { "category": "summary", "text": "cisco: information leak in ethernet frames.", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Linux 7.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2003-0001" }, { "category": "external", "summary": "RHBZ#1616933", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616933" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2003-0001", "url": "https://www.cve.org/CVERecord?id=CVE-2003-0001" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2003-0001", "url": "https://nvd.nist.gov/vuln/detail/CVE-2003-0001" } ], "release_date": "2003-01-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-06-25T17:45:00+00:00", "details": "NOTE: Installing the kernel rpms does not automatically prepare the system\nto boot the new kernel. Refer to the Problem Description section for\nspecific instructions.\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the kernel\nexplicitly on default configurations of up2date.", "product_ids": [ "Red Hat Linux 7.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2003:190" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "Red Hat Linux 7.1" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "cisco: information leak in ethernet frames." }, { "cve": "CVE-2003-0127", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616970" } ], "notes": [ { "category": "description", "text": "The kernel module loader in Linux kernel 2.2.x before 2.2.25, and 2.4.x before 2.4.21, allows local users to gain root privileges by using ptrace to attach to a child process that is spawned by the kernel.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Linux 7.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2003-0127" }, { "category": "external", "summary": "RHBZ#1616970", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616970" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2003-0127", "url": "https://www.cve.org/CVERecord?id=CVE-2003-0127" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2003-0127", "url": "https://nvd.nist.gov/vuln/detail/CVE-2003-0127" } ], "release_date": "2003-03-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-06-25T17:45:00+00:00", "details": "NOTE: Installing the kernel rpms does not automatically prepare the system\nto boot the new kernel. Refer to the Problem Description section for\nspecific instructions.\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the kernel\nexplicitly on default configurations of up2date.", "product_ids": [ "Red Hat Linux 7.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2003:190" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2003-0244", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617005" } ], "notes": [ { "category": "description", "text": "The route cache implementation in Linux 2.4, and the Netfilter IP conntrack module, allows remote attackers to cause a denial of service (CPU consumption) via packets with forged source addresses that cause a large number of hash table collisions.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Linux 7.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2003-0244" }, { "category": "external", "summary": "RHBZ#1617005", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617005" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2003-0244", "url": "https://www.cve.org/CVERecord?id=CVE-2003-0244" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2003-0244", "url": "https://nvd.nist.gov/vuln/detail/CVE-2003-0244" } ], "release_date": "2003-04-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-06-25T17:45:00+00:00", "details": "NOTE: Installing the kernel rpms does not automatically prepare the system\nto boot the new kernel. Refer to the Problem Description section for\nspecific instructions.\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the kernel\nexplicitly on default configurations of up2date.", "product_ids": [ "Red Hat Linux 7.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2003:190" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2003-0247", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617008" } ], "notes": [ { "category": "description", "text": "Unknown vulnerability in the TTY layer of the Linux kernel 2.4 allows attackers to cause a denial of service (\"kernel oops\").", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Linux 7.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2003-0247" }, { "category": "external", "summary": "RHBZ#1617008", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617008" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2003-0247", "url": "https://www.cve.org/CVERecord?id=CVE-2003-0247" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2003-0247", "url": "https://nvd.nist.gov/vuln/detail/CVE-2003-0247" } ], "release_date": "2003-06-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-06-25T17:45:00+00:00", "details": "NOTE: Installing the kernel rpms does not automatically prepare the system\nto boot the new kernel. Refer to the Problem Description section for\nspecific instructions.\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the kernel\nexplicitly on default configurations of up2date.", "product_ids": [ "Red Hat Linux 7.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2003:190" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2003-0364", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617022" } ], "notes": [ { "category": "description", "text": "The TCP/IP fragment reassembly handling in the Linux kernel 2.4 allows remote attackers to cause a denial of service (CPU consumption) via certain packets that cause a large number of hash table collisions.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Linux 7.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2003-0364" }, { "category": "external", "summary": "RHBZ#1617022", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617022" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2003-0364", "url": "https://www.cve.org/CVERecord?id=CVE-2003-0364" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2003-0364", "url": "https://nvd.nist.gov/vuln/detail/CVE-2003-0364" } ], "release_date": "2003-06-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-06-25T17:45:00+00:00", "details": "NOTE: Installing the kernel rpms does not automatically prepare the system\nto boot the new kernel. Refer to the Problem Description section for\nspecific instructions.\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the kernel\nexplicitly on default configurations of up2date.", "product_ids": [ "Red Hat Linux 7.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2003:190" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" } ] }
RHSA-2003:145
Vulnerability from csaf_redhat
Published
2003-05-27 18:52
Modified
2025-09-10 13:35
Summary
Red Hat Security Advisory: Updated kernel fixes security vulnerabilities and updates drivers
Notes
Topic
These updated kernel packages address security vulnerabilites, including a
potential data corruption scenario. In addition, a number of drivers have
been updated, bugs have been resolved, and support for the IBM x450 platform
and the Madison processor have been added.
Details
The Linux kernel handles the basic functions of the operating system.
A ptrace-related vulnerability has been discovered that could allow a local
user to gain elevated (root) privileges without authorization. The Common
Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name
CAN-2003-0127 to this issue.
A flaw has been discovered that could potentially lead to data corruption.
The scenario only occurs while performing memory mapped file I/O, where
the file is simultaneously unlinked and the corresponding file blocks
reallocated. Furthermore, the memory mapped must be to a partial page at
the end of a file on an ext3 file system. As such, Red Hat considers this
scenario unlikely.
A flaw has been found in several hash table implementations in the kernel
networking code. A remote attacker could send packets with carefully
chosen, forged source addresses in such a way as to make every routing
cache entry get hashed into the same hash chain. The result would be that
the kernel would use a disproportionate amount of processor time to deal
with new packets, resulting in a remote denial of service attack. The
Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned
the name CAN-2003-0244 to this issue.
In addition, the following drivers have been updated to the version indicated:
- e1000: 4.4.19-k1
- e100: 2.1.29-k2
- ips: 6.00.26
- qla2100, qla2200, qla2300: v6.04.01
- tg3 driver to 1.4c
- cciss driver to 2.4.44
- mpt fusion: 2.05.00
- aic7xxx to 6.2.32
- aic79xx to 1.3.6
If the system is configured to use alternate drivers, we recommend applying
the kudzu errata RHEA-2003:132 prior to updating the kernel.
The updated kernel also adds support for the IBM x450 platform and the
Madison processor, and incorporates improved support for the hugetlb file
system. This file system makes efficient use of the large page size
support that the Itanium architecture provides.
All users should upgrade to these errata packages, which address these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "These updated kernel packages address security vulnerabilites, including a\npotential data corruption scenario. In addition, a number of drivers have\nbeen updated, bugs have been resolved, and support for the IBM x450 platform\nand the Madison processor have been added.", "title": "Topic" }, { "category": "general", "text": "The Linux kernel handles the basic functions of the operating system.\n\nA ptrace-related vulnerability has been discovered that could allow a local\nuser to gain elevated (root) privileges without authorization. The Common\nVulnerabilities and Exposures project (cve.mitre.org) has assigned the name\nCAN-2003-0127 to this issue.\n\nA flaw has been discovered that could potentially lead to data corruption.\n The scenario only occurs while performing memory mapped file I/O, where\nthe file is simultaneously unlinked and the corresponding file blocks\nreallocated. Furthermore, the memory mapped must be to a partial page at\nthe end of a file on an ext3 file system. As such, Red Hat considers this\nscenario unlikely.\n\nA flaw has been found in several hash table implementations in the kernel\nnetworking code. A remote attacker could send packets with carefully\nchosen, forged source addresses in such a way as to make every routing\ncache entry get hashed into the same hash chain. The result would be that\nthe kernel would use a disproportionate amount of processor time to deal\nwith new packets, resulting in a remote denial of service attack. The\nCommon Vulnerabilities and Exposures project (cve.mitre.org) has assigned\nthe name CAN-2003-0244 to this issue.\n\nIn addition, the following drivers have been updated to the version indicated:\n\n- e1000: 4.4.19-k1\n- e100: 2.1.29-k2\n- ips: 6.00.26\n- qla2100, qla2200, qla2300: v6.04.01\n- tg3 driver to 1.4c\n- cciss driver to 2.4.44\n- mpt fusion: 2.05.00\n- aic7xxx to 6.2.32\n- aic79xx to 1.3.6\n\nIf the system is configured to use alternate drivers, we recommend applying\nthe kudzu errata RHEA-2003:132 prior to updating the kernel.\n\nThe updated kernel also adds support for the IBM x450 platform and the\nMadison processor, and incorporates improved support for the hugetlb file\nsystem. This file system makes efficient use of the large page size\nsupport that the Itanium architecture provides. \n\nAll users should upgrade to these errata packages, which address these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2003:145", "url": "https://access.redhat.com/errata/RHSA-2003:145" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2003/rhsa-2003_145.json" } ], "title": "Red Hat Security Advisory: Updated kernel fixes security vulnerabilities and updates drivers", "tracking": { "current_release_date": "2025-09-10T13:35:34+00:00", "generator": { "date": "2025-09-10T13:35:34+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.7" } }, "id": "RHSA-2003:145", "initial_release_date": "2003-05-27T18:52:00+00:00", "revision_history": [ { "date": "2003-05-27T18:52:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2003-05-27T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-09-10T13:35:34+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product": { "name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::as" } } }, { "category": "product_name", "name": "Red Hat Linux Advanced Workstation 2.1", "product": { "name": "Red Hat Linux Advanced Workstation 2.1", "product_id": "Red Hat Linux Advanced Workstation 2.1", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::aw" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2003-0127", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616970" } ], "notes": [ { "category": "description", "text": "The kernel module loader in Linux kernel 2.2.x before 2.2.25, and 2.4.x before 2.4.21, allows local users to gain root privileges by using ptrace to attach to a child process that is spawned by the kernel.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2003-0127" }, { "category": "external", "summary": "RHBZ#1616970", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616970" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2003-0127", "url": "https://www.cve.org/CVERecord?id=CVE-2003-0127" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2003-0127", "url": "https://nvd.nist.gov/vuln/detail/CVE-2003-0127" } ], "release_date": "2003-03-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-05-27T18:52:00+00:00", "details": "Release notes, driver notes, and driver disks for this update are available\nat the following URL:\n\nhttp://www.redhat.com/support/errata/rhel/\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied, especially the additional\npackages from RHSA-2002:205 and RHSA-2002:206 respectively.\n\nThe procedure for upgrading the kernel manually is documented at:\n\nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the kernel\nexplicitly on default configurations of up2date.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2003:145" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2003-0244", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617005" } ], "notes": [ { "category": "description", "text": "The route cache implementation in Linux 2.4, and the Netfilter IP conntrack module, allows remote attackers to cause a denial of service (CPU consumption) via packets with forged source addresses that cause a large number of hash table collisions.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2003-0244" }, { "category": "external", "summary": "RHBZ#1617005", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617005" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2003-0244", "url": "https://www.cve.org/CVERecord?id=CVE-2003-0244" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2003-0244", "url": "https://nvd.nist.gov/vuln/detail/CVE-2003-0244" } ], "release_date": "2003-04-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-05-27T18:52:00+00:00", "details": "Release notes, driver notes, and driver disks for this update are available\nat the following URL:\n\nhttp://www.redhat.com/support/errata/rhel/\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied, especially the additional\npackages from RHSA-2002:205 and RHSA-2002:206 respectively.\n\nThe procedure for upgrading the kernel manually is documented at:\n\nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the kernel\nexplicitly on default configurations of up2date.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2003:145" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" } ] }
rhsa-2003_098
Vulnerability from csaf_redhat
Published
2003-03-17 16:11
Modified
2024-11-21 22:42
Summary
Red Hat Security Advisory: : Updated 2.4 kernel fixes vulnerability
Notes
Topic
Updated kernel packages for Red Hat Linux 7.1, 7.2, 7.3, and 8.0 are now
available. These packages fix a ptrace-related vulnerability that can
lead to elevated (root) privileges.
[Updated 30 March 2003]
Updated kernel packages for Red Hat Linux 7.2 ia64 have been added.
[Updated 28 May 2003]
Replacement kernel packages for Red Hat Linux 7.2 ia64 have been added; the
previous packages did not contain the fix for the ptrace vulnerability.
Details
The Linux kernel handles the basic functions of the operating system.
A vulnerability has been found in version 2.4.18 of the kernel. This
vulnerability makes it possible for local users to gain elevated (root)
privileges without authorization. This advisory includes updates for
Red Hat Linux 7.1, 7.2, 7.3, and 8.0.
All users of Red Hat Linux 7.1, 7.2, 7.3, and 8.0 should upgrade to
these errata packages, which contain patches to fix the vulnerability.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel packages for Red Hat Linux 7.1, 7.2, 7.3, and 8.0 are now\navailable. These packages fix a ptrace-related vulnerability that can\nlead to elevated (root) privileges.\n\n[Updated 30 March 2003]\nUpdated kernel packages for Red Hat Linux 7.2 ia64 have been added.\n\n[Updated 28 May 2003]\nReplacement kernel packages for Red Hat Linux 7.2 ia64 have been added; the\nprevious packages did not contain the fix for the ptrace vulnerability.", "title": "Topic" }, { "category": "general", "text": "The Linux kernel handles the basic functions of the operating system.\n\nA vulnerability has been found in version 2.4.18 of the kernel. This\nvulnerability makes it possible for local users to gain elevated (root)\nprivileges without authorization. This advisory includes updates for\nRed Hat Linux 7.1, 7.2, 7.3, and 8.0.\n\nAll users of Red Hat Linux 7.1, 7.2, 7.3, and 8.0 should upgrade to\nthese errata packages, which contain patches to fix the vulnerability.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2003:098", "url": "https://access.redhat.com/errata/RHSA-2003:098" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2003/rhsa-2003_098.json" } ], "title": "Red Hat Security Advisory: : Updated 2.4 kernel fixes vulnerability", "tracking": { "current_release_date": "2024-11-21T22:42:21+00:00", "generator": { "date": "2024-11-21T22:42:21+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2003:098", "initial_release_date": "2003-03-17T16:11:00+00:00", "revision_history": [ { "date": "2003-03-17T16:11:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2003-03-17T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-21T22:42:21+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Linux 7.1", "product": { "name": "Red Hat Linux 7.1", "product_id": "Red Hat Linux 7.1", "product_identification_helper": { "cpe": "cpe:/o:redhat:linux:7.1" } } }, { "category": "product_name", "name": "Red Hat Linux 7.2", "product": { "name": "Red Hat Linux 7.2", "product_id": "Red Hat Linux 7.2", "product_identification_helper": { "cpe": "cpe:/o:redhat:linux:7.2" } } }, { "category": "product_name", "name": "Red Hat Linux 7.3", "product": { "name": "Red Hat Linux 7.3", "product_id": "Red Hat Linux 7.3", "product_identification_helper": { "cpe": "cpe:/o:redhat:linux:7.3" } } }, { "category": "product_name", "name": "Red Hat Linux 8.0", "product": { "name": "Red Hat Linux 8.0", "product_id": "Red Hat Linux 8.0", "product_identification_helper": { "cpe": "cpe:/o:redhat:linux:8.0" } } } ], "category": "product_family", "name": "Red Hat Linux" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2003-0127", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616970" } ], "notes": [ { "category": "description", "text": "The kernel module loader in Linux kernel 2.2.x before 2.2.25, and 2.4.x before 2.4.21, allows local users to gain root privileges by using ptrace to attach to a child process that is spawned by the kernel.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Linux 7.1", "Red Hat Linux 7.2", "Red Hat Linux 7.3", "Red Hat Linux 8.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2003-0127" }, { "category": "external", "summary": "RHBZ#1616970", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616970" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2003-0127", "url": "https://www.cve.org/CVERecord?id=CVE-2003-0127" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2003-0127", "url": "https://nvd.nist.gov/vuln/detail/CVE-2003-0127" } ], "release_date": "2003-03-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-03-17T16:11:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied, especially the additional\npackages from RHSA-2002:205 and RHSA-2002:206.\n\nThe procedure for upgrading the kernel manually is documented at:\n\nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the kernel\nexplicitly on default configurations of up2date.", "product_ids": [ "Red Hat Linux 7.1", "Red Hat Linux 7.2", "Red Hat Linux 7.3", "Red Hat Linux 8.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2003:098" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" } ] }
rhsa-2003:098
Vulnerability from csaf_redhat
Published
2003-03-17 16:11
Modified
2025-09-10 13:35
Summary
Red Hat Security Advisory: : Updated 2.4 kernel fixes vulnerability
Notes
Topic
Updated kernel packages for Red Hat Linux 7.1, 7.2, 7.3, and 8.0 are now
available. These packages fix a ptrace-related vulnerability that can
lead to elevated (root) privileges.
[Updated 30 March 2003]
Updated kernel packages for Red Hat Linux 7.2 ia64 have been added.
[Updated 28 May 2003]
Replacement kernel packages for Red Hat Linux 7.2 ia64 have been added; the
previous packages did not contain the fix for the ptrace vulnerability.
Details
The Linux kernel handles the basic functions of the operating system.
A vulnerability has been found in version 2.4.18 of the kernel. This
vulnerability makes it possible for local users to gain elevated (root)
privileges without authorization. This advisory includes updates for
Red Hat Linux 7.1, 7.2, 7.3, and 8.0.
All users of Red Hat Linux 7.1, 7.2, 7.3, and 8.0 should upgrade to
these errata packages, which contain patches to fix the vulnerability.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel packages for Red Hat Linux 7.1, 7.2, 7.3, and 8.0 are now\navailable. These packages fix a ptrace-related vulnerability that can\nlead to elevated (root) privileges.\n\n[Updated 30 March 2003]\nUpdated kernel packages for Red Hat Linux 7.2 ia64 have been added.\n\n[Updated 28 May 2003]\nReplacement kernel packages for Red Hat Linux 7.2 ia64 have been added; the\nprevious packages did not contain the fix for the ptrace vulnerability.", "title": "Topic" }, { "category": "general", "text": "The Linux kernel handles the basic functions of the operating system.\n\nA vulnerability has been found in version 2.4.18 of the kernel. This\nvulnerability makes it possible for local users to gain elevated (root)\nprivileges without authorization. This advisory includes updates for\nRed Hat Linux 7.1, 7.2, 7.3, and 8.0.\n\nAll users of Red Hat Linux 7.1, 7.2, 7.3, and 8.0 should upgrade to\nthese errata packages, which contain patches to fix the vulnerability.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2003:098", "url": "https://access.redhat.com/errata/RHSA-2003:098" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2003/rhsa-2003_098.json" } ], "title": "Red Hat Security Advisory: : Updated 2.4 kernel fixes vulnerability", "tracking": { "current_release_date": "2025-09-10T13:35:28+00:00", "generator": { "date": "2025-09-10T13:35:28+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.7" } }, "id": "RHSA-2003:098", "initial_release_date": "2003-03-17T16:11:00+00:00", "revision_history": [ { "date": "2003-03-17T16:11:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2003-03-17T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-09-10T13:35:28+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Linux 7.1", "product": { "name": "Red Hat Linux 7.1", "product_id": "Red Hat Linux 7.1", "product_identification_helper": { "cpe": "cpe:/o:redhat:linux:7.1" } } }, { "category": "product_name", "name": "Red Hat Linux 7.2", "product": { "name": "Red Hat Linux 7.2", "product_id": "Red Hat Linux 7.2", "product_identification_helper": { "cpe": "cpe:/o:redhat:linux:7.2" } } }, { "category": "product_name", "name": "Red Hat Linux 7.3", "product": { "name": "Red Hat Linux 7.3", "product_id": "Red Hat Linux 7.3", "product_identification_helper": { "cpe": "cpe:/o:redhat:linux:7.3" } } }, { "category": "product_name", "name": "Red Hat Linux 8.0", "product": { "name": "Red Hat Linux 8.0", "product_id": "Red Hat Linux 8.0", "product_identification_helper": { "cpe": "cpe:/o:redhat:linux:8.0" } } } ], "category": "product_family", "name": "Red Hat Linux" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2003-0127", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616970" } ], "notes": [ { "category": "description", "text": "The kernel module loader in Linux kernel 2.2.x before 2.2.25, and 2.4.x before 2.4.21, allows local users to gain root privileges by using ptrace to attach to a child process that is spawned by the kernel.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Linux 7.1", "Red Hat Linux 7.2", "Red Hat Linux 7.3", "Red Hat Linux 8.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2003-0127" }, { "category": "external", "summary": "RHBZ#1616970", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616970" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2003-0127", "url": "https://www.cve.org/CVERecord?id=CVE-2003-0127" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2003-0127", "url": "https://nvd.nist.gov/vuln/detail/CVE-2003-0127" } ], "release_date": "2003-03-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-03-17T16:11:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied, especially the additional\npackages from RHSA-2002:205 and RHSA-2002:206.\n\nThe procedure for upgrading the kernel manually is documented at:\n\nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the kernel\nexplicitly on default configurations of up2date.", "product_ids": [ "Red Hat Linux 7.1", "Red Hat Linux 7.2", "Red Hat Linux 7.3", "Red Hat Linux 8.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2003:098" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" } ] }
rhsa-2003:103
Vulnerability from csaf_redhat
Published
2003-03-21 08:53
Modified
2025-09-10 13:35
Summary
Red Hat Security Advisory: kernel security update
Notes
Topic
Updated kernel packages are now available that fix a ptrace-related
vulnerability which can lead to elevated (root) privileges.
Details
The Linux kernel handles the basic functions of the operating system.
A vulnerability has been found in version 2.4.18 of the kernel.
This vulnerability allows a local user to gain elevated (root) privileges
without authorization.
All users should upgrade to these errata packages, which contain patches to
fix the vulnerability.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel packages are now available that fix a ptrace-related\nvulnerability which can lead to elevated (root) privileges.", "title": "Topic" }, { "category": "general", "text": "The Linux kernel handles the basic functions of the operating system.\nA vulnerability has been found in version 2.4.18 of the kernel. \n\nThis vulnerability allows a local user to gain elevated (root) privileges\nwithout authorization. \n\nAll users should upgrade to these errata packages, which contain patches to\nfix the vulnerability.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2003:103", "url": "https://access.redhat.com/errata/RHSA-2003:103" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2003/rhsa-2003_103.json" } ], "title": "Red Hat Security Advisory: kernel security update", "tracking": { "current_release_date": "2025-09-10T13:35:30+00:00", "generator": { "date": "2025-09-10T13:35:30+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.7" } }, "id": "RHSA-2003:103", "initial_release_date": "2003-03-21T08:53:00+00:00", "revision_history": [ { "date": "2003-03-21T08:53:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2003-03-21T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-09-10T13:35:30+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product": { "name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 2.1", "product": { "name": "Red Hat Enterprise Linux ES version 2.1", "product_id": "Red Hat Enterprise Linux ES version 2.1", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 2.1", "product": { "name": "Red Hat Enterprise Linux WS version 2.1", "product_id": "Red Hat Enterprise Linux WS version 2.1", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2003-0127", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616970" } ], "notes": [ { "category": "description", "text": "The kernel module loader in Linux kernel 2.2.x before 2.2.25, and 2.4.x before 2.4.21, allows local users to gain root privileges by using ptrace to attach to a child process that is spawned by the kernel.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2003-0127" }, { "category": "external", "summary": "RHBZ#1616970", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616970" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2003-0127", "url": "https://www.cve.org/CVERecord?id=CVE-2003-0127" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2003-0127", "url": "https://nvd.nist.gov/vuln/detail/CVE-2003-0127" } ], "release_date": "2003-03-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-03-21T08:53:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThe procedure for upgrading the kernel manually is documented at:\n\nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the kernel\nexplicitly on default configurations of up2date.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2003:103" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" } ] }
rhsa-2003_103
Vulnerability from csaf_redhat
Published
2003-03-21 08:53
Modified
2024-11-21 22:42
Summary
Red Hat Security Advisory: kernel security update
Notes
Topic
Updated kernel packages are now available that fix a ptrace-related
vulnerability which can lead to elevated (root) privileges.
Details
The Linux kernel handles the basic functions of the operating system.
A vulnerability has been found in version 2.4.18 of the kernel.
This vulnerability allows a local user to gain elevated (root) privileges
without authorization.
All users should upgrade to these errata packages, which contain patches to
fix the vulnerability.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel packages are now available that fix a ptrace-related\nvulnerability which can lead to elevated (root) privileges.", "title": "Topic" }, { "category": "general", "text": "The Linux kernel handles the basic functions of the operating system.\nA vulnerability has been found in version 2.4.18 of the kernel. \n\nThis vulnerability allows a local user to gain elevated (root) privileges\nwithout authorization. \n\nAll users should upgrade to these errata packages, which contain patches to\nfix the vulnerability.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2003:103", "url": "https://access.redhat.com/errata/RHSA-2003:103" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2003/rhsa-2003_103.json" } ], "title": "Red Hat Security Advisory: kernel security update", "tracking": { "current_release_date": "2024-11-21T22:42:25+00:00", "generator": { "date": "2024-11-21T22:42:25+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2003:103", "initial_release_date": "2003-03-21T08:53:00+00:00", "revision_history": [ { "date": "2003-03-21T08:53:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2003-03-21T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-21T22:42:25+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product": { "name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 2.1", "product": { "name": "Red Hat Enterprise Linux ES version 2.1", "product_id": "Red Hat Enterprise Linux ES version 2.1", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 2.1", "product": { "name": "Red Hat Enterprise Linux WS version 2.1", "product_id": "Red Hat Enterprise Linux WS version 2.1", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2003-0127", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616970" } ], "notes": [ { "category": "description", "text": "The kernel module loader in Linux kernel 2.2.x before 2.2.25, and 2.4.x before 2.4.21, allows local users to gain root privileges by using ptrace to attach to a child process that is spawned by the kernel.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2003-0127" }, { "category": "external", "summary": "RHBZ#1616970", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616970" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2003-0127", "url": "https://www.cve.org/CVERecord?id=CVE-2003-0127" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2003-0127", "url": "https://nvd.nist.gov/vuln/detail/CVE-2003-0127" } ], "release_date": "2003-03-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-03-21T08:53:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThe procedure for upgrading the kernel manually is documented at:\n\nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the kernel\nexplicitly on default configurations of up2date.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2003:103" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" } ] }
rhsa-2003_190
Vulnerability from csaf_redhat
Published
2003-06-25 17:45
Modified
2024-11-21 22:47
Summary
Red Hat Security Advisory: : : : Updated 2.4 kernel for pSeries and iSeries fixes vulnerabilities
Notes
Topic
Updated kernel packages, based on the 2.4.18 kernel, are now available for
Red Hat Linux 7.1 for iSeries and pSeries systems.
Please see the NOTE at the end of the description for important information
about booting the new kernel on your system.
Details
The Linux kernel handles the basic functions of the operating system.
A number of security issues have been found which affect the version of the
Linux kernel shipped for iSeries and pSeries systems:
Al Viro found a security issue in the tty layer whereby any user could
cause a kernel oops. The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the name CAN-2002-0247 to this issue.
Multiple Ethernet Network Interface Card (NIC) device drivers do not pad
frames with null bytes. This allows remote attackers to obtain information
from previous packets or kernel memory by using malformed packets. The
Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned
the name CAN-2003-0001 to this issue.
The kernel module loader allows local users to gain root privileges by
using ptrace to attach to a child process that is spawned by the kernel.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the name CAN-2003-0127 to this issue.
A flaw has been found in several hash table implementations in the kernel
networking code. A remote attacker could send packets with carefully
chosen, forged source addresses in such a way as to make every routing
cache entry get hashed into the same hash chain. The result would be that
the kernel would use a disproportionate amount of processor time to deal
with new packets, resulting in a remote denial of service attack. The
Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned
the names CAN-2003-0244 and CAN-2003-0364 to these issues.
NOTE: Installing the kernel RPMs will not automatically prepare the system
to boot the new kernel. Refer to the following sections for the appropriate
instructions to boot the new kernel on your machine.
Preparing to boot the new kernel on iSeries:
After the kernel RPM is installed, the new kernel image file is
/boot/vmlinux. This is a link to the /boot/vmlinux-"version" file (where
"version" is the new kernel's version-release).
Use the installkernel.iSeries command to load the new kernel image into the
"side" from which you want to boot. For instance, to boot from the C side,
use the command:
installkernel.iSeries C /boot/vmlinux
Preparing to boot the new kernel on pSeries:
After the kernel RPM is installed, the new kernel image file is
/boot/vmlinux. This is a link to the /boot/vmlinux-"version" file (where
"version" is the new kernel's version-release).
Edit the /etc/yaboot.conf file to instruct YABOOT to boot the new
kernel. Add a new stanza or change the existing stanza to point to
the new kernel image file. The yaboot.conf man page has detailed
information about the format of the yaboot configuration file.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel packages, based on the 2.4.18 kernel, are now available for\nRed Hat Linux 7.1 for iSeries and pSeries systems.\n\nPlease see the NOTE at the end of the description for important information\nabout booting the new kernel on your system.", "title": "Topic" }, { "category": "general", "text": "The Linux kernel handles the basic functions of the operating system.\n\nA number of security issues have been found which affect the version of the\nLinux kernel shipped for iSeries and pSeries systems:\n\nAl Viro found a security issue in the tty layer whereby any user could\ncause a kernel oops. The Common Vulnerabilities and Exposures project\n(cve.mitre.org) has assigned the name CAN-2002-0247 to this issue.\n\nMultiple Ethernet Network Interface Card (NIC) device drivers do not pad\nframes with null bytes. This allows remote attackers to obtain information\nfrom previous packets or kernel memory by using malformed packets. The\nCommon Vulnerabilities and Exposures project (cve.mitre.org) has assigned\nthe name CAN-2003-0001 to this issue.\n\nThe kernel module loader allows local users to gain root privileges by\nusing ptrace to attach to a child process that is spawned by the kernel.\nThe Common Vulnerabilities and Exposures project (cve.mitre.org) has\nassigned the name CAN-2003-0127 to this issue.\n\nA flaw has been found in several hash table implementations in the kernel\nnetworking code. A remote attacker could send packets with carefully\nchosen, forged source addresses in such a way as to make every routing\ncache entry get hashed into the same hash chain. The result would be that\nthe kernel would use a disproportionate amount of processor time to deal\nwith new packets, resulting in a remote denial of service attack. The\nCommon Vulnerabilities and Exposures project (cve.mitre.org) has assigned\nthe names CAN-2003-0244 and CAN-2003-0364 to these issues.\n\nNOTE: Installing the kernel RPMs will not automatically prepare the system\nto boot the new kernel. Refer to the following sections for the appropriate\ninstructions to boot the new kernel on your machine.\n\nPreparing to boot the new kernel on iSeries:\n\nAfter the kernel RPM is installed, the new kernel image file is\n/boot/vmlinux. This is a link to the /boot/vmlinux-\"version\" file (where\n\"version\" is the new kernel\u0027s version-release).\n\nUse the installkernel.iSeries command to load the new kernel image into the\n\"side\" from which you want to boot. For instance, to boot from the C side,\nuse the command:\n\ninstallkernel.iSeries C /boot/vmlinux\n\nPreparing to boot the new kernel on pSeries:\n\nAfter the kernel RPM is installed, the new kernel image file is\n/boot/vmlinux. This is a link to the /boot/vmlinux-\"version\" file (where\n\"version\" is the new kernel\u0027s version-release).\n\nEdit the /etc/yaboot.conf file to instruct YABOOT to boot the new\nkernel. Add a new stanza or change the existing stanza to point to\nthe new kernel image file. The yaboot.conf man page has detailed\ninformation about the format of the yaboot configuration file.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2003:190", "url": "https://access.redhat.com/errata/RHSA-2003:190" }, { "category": "external", "summary": "79910", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=79910" }, { "category": "external", "summary": "79911", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=79911" }, { "category": "external", "summary": "79912", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=79912" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2003/rhsa-2003_190.json" } ], "title": "Red Hat Security Advisory: : : : Updated 2.4 kernel for pSeries and iSeries fixes vulnerabilities", "tracking": { "current_release_date": "2024-11-21T22:47:11+00:00", "generator": { "date": "2024-11-21T22:47:11+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2003:190", "initial_release_date": "2003-06-25T17:45:00+00:00", "revision_history": [ { "date": "2003-06-25T17:45:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2003-06-25T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-21T22:47:11+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Linux 7.1", "product": { "name": "Red Hat Linux 7.1", "product_id": "Red Hat Linux 7.1", "product_identification_helper": { "cpe": "cpe:/o:redhat:linux:7.1" } } } ], "category": "product_family", "name": "Red Hat Linux" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2003-0001", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2003-01-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616933" } ], "notes": [ { "category": "description", "text": "Multiple ethernet Network Interface Card (NIC) device drivers do not pad frames with null bytes, which allows remote attackers to obtain information from previous packets or kernel memory by using malformed packets, as demonstrated by Etherleak.", "title": "Vulnerability description" }, { "category": "summary", "text": "cisco: information leak in ethernet frames.", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Linux 7.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2003-0001" }, { "category": "external", "summary": "RHBZ#1616933", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616933" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2003-0001", "url": "https://www.cve.org/CVERecord?id=CVE-2003-0001" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2003-0001", "url": "https://nvd.nist.gov/vuln/detail/CVE-2003-0001" } ], "release_date": "2003-01-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-06-25T17:45:00+00:00", "details": "NOTE: Installing the kernel rpms does not automatically prepare the system\nto boot the new kernel. Refer to the Problem Description section for\nspecific instructions.\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the kernel\nexplicitly on default configurations of up2date.", "product_ids": [ "Red Hat Linux 7.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2003:190" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "Red Hat Linux 7.1" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "cisco: information leak in ethernet frames." }, { "cve": "CVE-2003-0127", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616970" } ], "notes": [ { "category": "description", "text": "The kernel module loader in Linux kernel 2.2.x before 2.2.25, and 2.4.x before 2.4.21, allows local users to gain root privileges by using ptrace to attach to a child process that is spawned by the kernel.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Linux 7.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2003-0127" }, { "category": "external", "summary": "RHBZ#1616970", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616970" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2003-0127", "url": "https://www.cve.org/CVERecord?id=CVE-2003-0127" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2003-0127", "url": "https://nvd.nist.gov/vuln/detail/CVE-2003-0127" } ], "release_date": "2003-03-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-06-25T17:45:00+00:00", "details": "NOTE: Installing the kernel rpms does not automatically prepare the system\nto boot the new kernel. Refer to the Problem Description section for\nspecific instructions.\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the kernel\nexplicitly on default configurations of up2date.", "product_ids": [ "Red Hat Linux 7.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2003:190" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2003-0244", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617005" } ], "notes": [ { "category": "description", "text": "The route cache implementation in Linux 2.4, and the Netfilter IP conntrack module, allows remote attackers to cause a denial of service (CPU consumption) via packets with forged source addresses that cause a large number of hash table collisions.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Linux 7.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2003-0244" }, { "category": "external", "summary": "RHBZ#1617005", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617005" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2003-0244", "url": "https://www.cve.org/CVERecord?id=CVE-2003-0244" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2003-0244", "url": "https://nvd.nist.gov/vuln/detail/CVE-2003-0244" } ], "release_date": "2003-04-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-06-25T17:45:00+00:00", "details": "NOTE: Installing the kernel rpms does not automatically prepare the system\nto boot the new kernel. Refer to the Problem Description section for\nspecific instructions.\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the kernel\nexplicitly on default configurations of up2date.", "product_ids": [ "Red Hat Linux 7.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2003:190" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2003-0247", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617008" } ], "notes": [ { "category": "description", "text": "Unknown vulnerability in the TTY layer of the Linux kernel 2.4 allows attackers to cause a denial of service (\"kernel oops\").", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Linux 7.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2003-0247" }, { "category": "external", "summary": "RHBZ#1617008", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617008" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2003-0247", "url": "https://www.cve.org/CVERecord?id=CVE-2003-0247" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2003-0247", "url": "https://nvd.nist.gov/vuln/detail/CVE-2003-0247" } ], "release_date": "2003-06-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-06-25T17:45:00+00:00", "details": "NOTE: Installing the kernel rpms does not automatically prepare the system\nto boot the new kernel. Refer to the Problem Description section for\nspecific instructions.\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the kernel\nexplicitly on default configurations of up2date.", "product_ids": [ "Red Hat Linux 7.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2003:190" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2003-0364", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617022" } ], "notes": [ { "category": "description", "text": "The TCP/IP fragment reassembly handling in the Linux kernel 2.4 allows remote attackers to cause a denial of service (CPU consumption) via certain packets that cause a large number of hash table collisions.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Linux 7.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2003-0364" }, { "category": "external", "summary": "RHBZ#1617022", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617022" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2003-0364", "url": "https://www.cve.org/CVERecord?id=CVE-2003-0364" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2003-0364", "url": "https://nvd.nist.gov/vuln/detail/CVE-2003-0364" } ], "release_date": "2003-06-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-06-25T17:45:00+00:00", "details": "NOTE: Installing the kernel rpms does not automatically prepare the system\nto boot the new kernel. Refer to the Problem Description section for\nspecific instructions.\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the kernel\nexplicitly on default configurations of up2date.", "product_ids": [ "Red Hat Linux 7.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2003:190" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" } ] }
RHSA-2003:098
Vulnerability from csaf_redhat
Published
2003-03-17 16:11
Modified
2025-09-10 13:35
Summary
Red Hat Security Advisory: : Updated 2.4 kernel fixes vulnerability
Notes
Topic
Updated kernel packages for Red Hat Linux 7.1, 7.2, 7.3, and 8.0 are now
available. These packages fix a ptrace-related vulnerability that can
lead to elevated (root) privileges.
[Updated 30 March 2003]
Updated kernel packages for Red Hat Linux 7.2 ia64 have been added.
[Updated 28 May 2003]
Replacement kernel packages for Red Hat Linux 7.2 ia64 have been added; the
previous packages did not contain the fix for the ptrace vulnerability.
Details
The Linux kernel handles the basic functions of the operating system.
A vulnerability has been found in version 2.4.18 of the kernel. This
vulnerability makes it possible for local users to gain elevated (root)
privileges without authorization. This advisory includes updates for
Red Hat Linux 7.1, 7.2, 7.3, and 8.0.
All users of Red Hat Linux 7.1, 7.2, 7.3, and 8.0 should upgrade to
these errata packages, which contain patches to fix the vulnerability.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel packages for Red Hat Linux 7.1, 7.2, 7.3, and 8.0 are now\navailable. These packages fix a ptrace-related vulnerability that can\nlead to elevated (root) privileges.\n\n[Updated 30 March 2003]\nUpdated kernel packages for Red Hat Linux 7.2 ia64 have been added.\n\n[Updated 28 May 2003]\nReplacement kernel packages for Red Hat Linux 7.2 ia64 have been added; the\nprevious packages did not contain the fix for the ptrace vulnerability.", "title": "Topic" }, { "category": "general", "text": "The Linux kernel handles the basic functions of the operating system.\n\nA vulnerability has been found in version 2.4.18 of the kernel. This\nvulnerability makes it possible for local users to gain elevated (root)\nprivileges without authorization. This advisory includes updates for\nRed Hat Linux 7.1, 7.2, 7.3, and 8.0.\n\nAll users of Red Hat Linux 7.1, 7.2, 7.3, and 8.0 should upgrade to\nthese errata packages, which contain patches to fix the vulnerability.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2003:098", "url": "https://access.redhat.com/errata/RHSA-2003:098" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2003/rhsa-2003_098.json" } ], "title": "Red Hat Security Advisory: : Updated 2.4 kernel fixes vulnerability", "tracking": { "current_release_date": "2025-09-10T13:35:28+00:00", "generator": { "date": "2025-09-10T13:35:28+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.7" } }, "id": "RHSA-2003:098", "initial_release_date": "2003-03-17T16:11:00+00:00", "revision_history": [ { "date": "2003-03-17T16:11:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2003-03-17T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-09-10T13:35:28+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Linux 7.1", "product": { "name": "Red Hat Linux 7.1", "product_id": "Red Hat Linux 7.1", "product_identification_helper": { "cpe": "cpe:/o:redhat:linux:7.1" } } }, { "category": "product_name", "name": "Red Hat Linux 7.2", "product": { "name": "Red Hat Linux 7.2", "product_id": "Red Hat Linux 7.2", "product_identification_helper": { "cpe": "cpe:/o:redhat:linux:7.2" } } }, { "category": "product_name", "name": "Red Hat Linux 7.3", "product": { "name": "Red Hat Linux 7.3", "product_id": "Red Hat Linux 7.3", "product_identification_helper": { "cpe": "cpe:/o:redhat:linux:7.3" } } }, { "category": "product_name", "name": "Red Hat Linux 8.0", "product": { "name": "Red Hat Linux 8.0", "product_id": "Red Hat Linux 8.0", "product_identification_helper": { "cpe": "cpe:/o:redhat:linux:8.0" } } } ], "category": "product_family", "name": "Red Hat Linux" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2003-0127", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616970" } ], "notes": [ { "category": "description", "text": "The kernel module loader in Linux kernel 2.2.x before 2.2.25, and 2.4.x before 2.4.21, allows local users to gain root privileges by using ptrace to attach to a child process that is spawned by the kernel.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Linux 7.1", "Red Hat Linux 7.2", "Red Hat Linux 7.3", "Red Hat Linux 8.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2003-0127" }, { "category": "external", "summary": "RHBZ#1616970", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616970" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2003-0127", "url": "https://www.cve.org/CVERecord?id=CVE-2003-0127" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2003-0127", "url": "https://nvd.nist.gov/vuln/detail/CVE-2003-0127" } ], "release_date": "2003-03-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-03-17T16:11:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied, especially the additional\npackages from RHSA-2002:205 and RHSA-2002:206.\n\nThe procedure for upgrading the kernel manually is documented at:\n\nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the kernel\nexplicitly on default configurations of up2date.", "product_ids": [ "Red Hat Linux 7.1", "Red Hat Linux 7.2", "Red Hat Linux 7.3", "Red Hat Linux 8.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2003:098" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" } ] }
rhsa-2003_088
Vulnerability from csaf_redhat
Published
2003-03-20 08:56
Modified
2024-11-21 22:42
Summary
Red Hat Security Advisory: : New kernel 2.2 packages fix vulnerabilities
Notes
Topic
Updated kernel packages for Red Hat Linux 6.2 and 7.0 are now available
that fix several security vulnerabilities.
Details
The Linux kernel handles the basic functions of the operating system.
A bug in the kernel module loader code allows a local user to gain root
privileges. The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the name CAN-2003-0127 to this issue.
Multiple ethernet Network Interface Card (NIC) device drivers do not pad
frames with null bytes, which allows remote attackers to obtain information
from previous packets or kernel memory by using malformed packets. The
Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned
the name CAN-2003-0001 to this issue.
The Linux 2.2 kernel allows local users to cause a denial of service
(crash) by using the mmap() function with a PROT_READ parameter to access
non-readable memory pages through the /proc/pid/mem interface. The
Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned
the name CAN-2002-1380 to this issue.
All users of Red Hat Linux 6.2 and 7 should upgrade to these errata
packages, which contain version 2.2.24 of the Linux kernel with patches and
are not vulnerable to these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel packages for Red Hat Linux 6.2 and 7.0 are now available\nthat fix several security vulnerabilities.", "title": "Topic" }, { "category": "general", "text": "The Linux kernel handles the basic functions of the operating system.\n\nA bug in the kernel module loader code allows a local user to gain root \nprivileges. The Common Vulnerabilities and Exposures project\n(cve.mitre.org) has assigned the name CAN-2003-0127 to this issue.\n\nMultiple ethernet Network Interface Card (NIC) device drivers do not pad\nframes with null bytes, which allows remote attackers to obtain information\nfrom previous packets or kernel memory by using malformed packets. The\nCommon Vulnerabilities and Exposures project (cve.mitre.org) has assigned\nthe name CAN-2003-0001 to this issue.\n\nThe Linux 2.2 kernel allows local users to cause a denial of service\n(crash) by using the mmap() function with a PROT_READ parameter to access\nnon-readable memory pages through the /proc/pid/mem interface. The\nCommon Vulnerabilities and Exposures project (cve.mitre.org) has assigned\nthe name CAN-2002-1380 to this issue.\n\nAll users of Red Hat Linux 6.2 and 7 should upgrade to these errata\npackages, which contain version 2.2.24 of the Linux kernel with patches and\nare not vulnerable to these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2003:088", "url": "https://access.redhat.com/errata/RHSA-2003:088" }, { "category": "external", "summary": "http://www.atstake.com/research/advisories/2003/a010603-1.txt", "url": "http://www.atstake.com/research/advisories/2003/a010603-1.txt" }, { "category": "external", "summary": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=104033054204316", "url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=104033054204316" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2003/rhsa-2003_088.json" } ], "title": "Red Hat Security Advisory: : New kernel 2.2 packages fix vulnerabilities", "tracking": { "current_release_date": "2024-11-21T22:42:17+00:00", "generator": { "date": "2024-11-21T22:42:17+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2003:088", "initial_release_date": "2003-03-20T08:56:00+00:00", "revision_history": [ { "date": "2003-03-20T08:56:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2003-03-20T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-21T22:42:17+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Linux 6.2", "product": { "name": "Red Hat Linux 6.2", "product_id": "Red Hat Linux 6.2", "product_identification_helper": { "cpe": "cpe:/o:redhat:linux:6.2" } } }, { "category": "product_name", "name": "Red Hat Linux 7.0", "product": { "name": "Red Hat Linux 7.0", "product_id": "Red Hat Linux 7.0", "product_identification_helper": { "cpe": "cpe:/o:redhat:linux:7.0" } } } ], "category": "product_family", "name": "Red Hat Linux" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2002-1380", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616901" } ], "notes": [ { "category": "description", "text": "Linux kernel 2.2.x allows local users to cause a denial of service (crash) by using the mmap() function with a PROT_READ parameter to access non-readable memory pages through the /proc/pid/mem interface.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Linux 6.2", "Red Hat Linux 7.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2002-1380" }, { "category": "external", "summary": "RHBZ#1616901", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616901" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2002-1380", "url": "https://www.cve.org/CVERecord?id=CVE-2002-1380" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2002-1380", "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-1380" } ], "release_date": "2002-12-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-03-20T08:56:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied. \n\nThe procedure for upgrading the kernel is documented at:\n\nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/kernel-upgrade.html\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the kernel\nexplicitly on default configurations of up2date.", "product_ids": [ "Red Hat Linux 6.2", "Red Hat Linux 7.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2003:088" } ], "title": "security flaw" }, { "cve": "CVE-2003-0001", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2003-01-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616933" } ], "notes": [ { "category": "description", "text": "Multiple ethernet Network Interface Card (NIC) device drivers do not pad frames with null bytes, which allows remote attackers to obtain information from previous packets or kernel memory by using malformed packets, as demonstrated by Etherleak.", "title": "Vulnerability description" }, { "category": "summary", "text": "cisco: information leak in ethernet frames.", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat Linux 6.2", "Red Hat Linux 7.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2003-0001" }, { "category": "external", "summary": "RHBZ#1616933", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616933" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2003-0001", "url": "https://www.cve.org/CVERecord?id=CVE-2003-0001" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2003-0001", "url": "https://nvd.nist.gov/vuln/detail/CVE-2003-0001" } ], "release_date": "2003-01-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-03-20T08:56:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied. \n\nThe procedure for upgrading the kernel is documented at:\n\nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/kernel-upgrade.html\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the kernel\nexplicitly on default configurations of up2date.", "product_ids": [ "Red Hat Linux 6.2", "Red Hat Linux 7.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2003:088" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "products": [ "Red Hat Linux 6.2", "Red Hat Linux 7.0" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "cisco: information leak in ethernet frames." }, { "cve": "CVE-2003-0127", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616970" } ], "notes": [ { "category": "description", "text": "The kernel module loader in Linux kernel 2.2.x before 2.2.25, and 2.4.x before 2.4.21, allows local users to gain root privileges by using ptrace to attach to a child process that is spawned by the kernel.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Linux 6.2", "Red Hat Linux 7.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2003-0127" }, { "category": "external", "summary": "RHBZ#1616970", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616970" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2003-0127", "url": "https://www.cve.org/CVERecord?id=CVE-2003-0127" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2003-0127", "url": "https://nvd.nist.gov/vuln/detail/CVE-2003-0127" } ], "release_date": "2003-03-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-03-20T08:56:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied. \n\nThe procedure for upgrading the kernel is documented at:\n\nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/kernel-upgrade.html\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the kernel\nexplicitly on default configurations of up2date.", "product_ids": [ "Red Hat Linux 6.2", "Red Hat Linux 7.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2003:088" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" } ] }
RHSA-2003:103
Vulnerability from csaf_redhat
Published
2003-03-21 08:53
Modified
2025-09-10 13:35
Summary
Red Hat Security Advisory: kernel security update
Notes
Topic
Updated kernel packages are now available that fix a ptrace-related
vulnerability which can lead to elevated (root) privileges.
Details
The Linux kernel handles the basic functions of the operating system.
A vulnerability has been found in version 2.4.18 of the kernel.
This vulnerability allows a local user to gain elevated (root) privileges
without authorization.
All users should upgrade to these errata packages, which contain patches to
fix the vulnerability.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel packages are now available that fix a ptrace-related\nvulnerability which can lead to elevated (root) privileges.", "title": "Topic" }, { "category": "general", "text": "The Linux kernel handles the basic functions of the operating system.\nA vulnerability has been found in version 2.4.18 of the kernel. \n\nThis vulnerability allows a local user to gain elevated (root) privileges\nwithout authorization. \n\nAll users should upgrade to these errata packages, which contain patches to\nfix the vulnerability.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2003:103", "url": "https://access.redhat.com/errata/RHSA-2003:103" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2003/rhsa-2003_103.json" } ], "title": "Red Hat Security Advisory: kernel security update", "tracking": { "current_release_date": "2025-09-10T13:35:30+00:00", "generator": { "date": "2025-09-10T13:35:30+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.6.7" } }, "id": "RHSA-2003:103", "initial_release_date": "2003-03-21T08:53:00+00:00", "revision_history": [ { "date": "2003-03-21T08:53:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2003-03-21T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2025-09-10T13:35:30+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product": { "name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 2.1", "product": { "name": "Red Hat Enterprise Linux ES version 2.1", "product_id": "Red Hat Enterprise Linux ES version 2.1", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 2.1", "product": { "name": "Red Hat Enterprise Linux WS version 2.1", "product_id": "Red Hat Enterprise Linux WS version 2.1", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2003-0127", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616970" } ], "notes": [ { "category": "description", "text": "The kernel module loader in Linux kernel 2.2.x before 2.2.25, and 2.4.x before 2.4.21, allows local users to gain root privileges by using ptrace to attach to a child process that is spawned by the kernel.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2003-0127" }, { "category": "external", "summary": "RHBZ#1616970", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616970" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2003-0127", "url": "https://www.cve.org/CVERecord?id=CVE-2003-0127" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2003-0127", "url": "https://nvd.nist.gov/vuln/detail/CVE-2003-0127" } ], "release_date": "2003-03-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-03-21T08:53:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThe procedure for upgrading the kernel manually is documented at:\n\nhttp://www.redhat.com/support/docs/howto/kernel-upgrade/\n\nPlease read the directions for your architecture carefully before\nproceeding with the kernel upgrade.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this to be an easier way to apply updates. To use Red Hat\nNetwork, launch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system. Note that you need to select the kernel\nexplicitly on default configurations of up2date.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2003:103" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" } ] }
fkie_cve-2003-0127
Vulnerability from fkie_nvd
Published
2003-03-31 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
The kernel module loader in Linux kernel 2.2.x before 2.2.25, and 2.4.x before 2.4.21, allows local users to gain root privileges by using ptrace to attach to a child process that is spawned by the kernel.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "146F7A77-A950-4CAD-BDA9-C239696F569D", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "AD7A6B55-2F3B-422E-B1F2-80B482FE89AA", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "70DCE8FF-40C3-44F7-8185-0422ADDA051B", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "7DAC3A7C-2092-46D4-908B-CF03F4217112", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "956B7F2F-DE46-492F-ACA3-BD5EE7EA14F3", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "DE77B8D6-EF2A-4EC2-AF75-B6FA48747781", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "AAEC8651-9291-4CAE-AA49-C1CA4C7AE450", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.2.7:*:*:*:*:*:*:*", "matchCriteriaId": "5A6F3945-21ED-44C6-86D2-B7755A87014E", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "C4919EB3-625C-4D83-8DCB-72BCF05DF2C6", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "A5DDB008-E88E-473C-B030-AF9B6F5E4E48", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.2.10:*:*:*:*:*:*:*", "matchCriteriaId": "AA3D3E03-0ABE-4325-AD67-BA8EA16B6DBE", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.2.11:*:*:*:*:*:*:*", "matchCriteriaId": "0E48C9A9-B7E6-4314-BCEF-8013BBB4276E", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.2.12:*:*:*:*:*:*:*", "matchCriteriaId": "0EEF4480-D50B-464C-AE39-A12455DBC99F", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.2.13:*:*:*:*:*:*:*", "matchCriteriaId": "6BBFD0DB-0A18-4545-9B4B-697AAC11E9C5", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.2.14:*:*:*:*:*:*:*", "matchCriteriaId": "15928E10-7D41-45B2-87D6-8AA10190A8EB", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.2.15:*:*:*:*:*:*:*", "matchCriteriaId": "C18E13C4-F42D-4168-B25E-544E1549C46B", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.2.16:*:*:*:*:*:*:*", "matchCriteriaId": "F0DB9B7C-3608-44E3-AE47-D231D1F7B8EC", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.2.17:*:*:*:*:*:*:*", "matchCriteriaId": "C4947CDE-CB89-456B-8B5F-0E17B46BC893", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.2.18:*:*:*:*:*:*:*", "matchCriteriaId": "6ECB42B3-70C6-4019-8B8B-8EB7A84B39AF", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.2.19:*:*:*:*:*:*:*", "matchCriteriaId": "BF701E58-35E8-4DDE-B832-C5A23E61A3CA", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.2.20:*:*:*:*:*:*:*", "matchCriteriaId": "3C122CC4-B8CB-4AB9-8571-6F3D302F56A7", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.2.21:*:*:*:*:*:*:*", "matchCriteriaId": "2498D898-D243-4D0C-9AEF-0138D19A68B9", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.2.22:*:*:*:*:*:*:*", "matchCriteriaId": "3924060B-1EC1-4003-B306-E327634E7797", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.2.23:*:*:*:*:*:*:*", "matchCriteriaId": "D45B43DF-FD4C-4C37-9569-1CCE450B8987", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.2.24:*:*:*:*:*:*:*", "matchCriteriaId": "99879B2B-7FFB-4181-8928-13B7E17F36C6", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "C24A129D-2E5E-436C-95DE-AE75D2E8D092", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "55B85D5B-4EA1-4FCF-8D50-9C54E8FDA92F", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "01408EC0-9C2D-4A44-8080-D7FC7E1A1FA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "5F49A384-7222-41F3-9BE1-4E18C00E50A6", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.4.4:*:*:*:*:*:*:*", "matchCriteriaId": "05520FE3-C48D-42E8-BC24-C2396BD46CBA", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.4.5:*:*:*:*:*:*:*", "matchCriteriaId": "D865FBB6-E07D-492F-A75E-168B06C8ADEE", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.4.6:*:*:*:*:*:*:*", "matchCriteriaId": "598F24C2-0366-4799-865C-5EE4572B734B", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.4.7:*:*:*:*:*:*:*", "matchCriteriaId": "D0399660-6385-45AB-9785-E504D8788146", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.4.8:*:*:*:*:*:*:*", "matchCriteriaId": "DCBC50EA-130C-41B7-83EA-C523B3C3AAD7", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.4.9:*:*:*:*:*:*:*", "matchCriteriaId": "B91F6CBE-400F-4D0B-B893-34577B47A342", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.4.10:*:*:*:*:*:*:*", "matchCriteriaId": "1548ECFD-FCB5-4AE0-9788-42F61F25489F", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.4.11:*:*:*:*:*:*:*", "matchCriteriaId": "6ABB9787-5497-4BDC-8952-F99CF60A89BD", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.4.12:*:*:*:*:*:*:*", "matchCriteriaId": "615F6BA2-CD51-4159-B28A-A018CA9FC25C", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.4.13:*:*:*:*:*:*:*", "matchCriteriaId": "093848CB-68A1-4258-8357-373A477FE4E2", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.4.14:*:*:*:*:*:*:*", "matchCriteriaId": "E275F440-A427-465F-B314-BF0730C781DB", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.4.15:*:*:*:*:*:*:*", "matchCriteriaId": "98651D39-60CF-409F-8276-DBBB56B972AA", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.4.16:*:*:*:*:*:*:*", "matchCriteriaId": "067B8E09-C923-4DDA-92DB-4A2892CB526A", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.4.17:*:*:*:*:*:*:*", "matchCriteriaId": "9EBE3738-E530-4EC6-9FC6-1A063605BE05", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.4.18:*:*:*:*:*:*:*", "matchCriteriaId": "474384F1-FB2D-4C00-A4CD-0C2C5AE42DB4", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.4.19:*:*:*:*:*:*:*", "matchCriteriaId": "F677E992-8D37-438F-97DF-9D98B28F020C", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.4.20:*:*:*:*:*:*:*", "matchCriteriaId": "476687F9-722B-490C-BD0B-B5F2CD7891DC", "vulnerable": true }, { "criteria": "cpe:2.3:o:linux:linux_kernel:2.4.21:pre1:*:*:*:*:*:*", "matchCriteriaId": "8EEBFBB4-CC06-40D2-8DE9-22E82DBEFADA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The kernel module loader in Linux kernel 2.2.x before 2.2.25, and 2.4.x before 2.4.21, allows local users to gain root privileges by using ptrace to attach to a child process that is spawned by the kernel." } ], "id": "CVE-2003-0127", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2003-03-31T05:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2003-020.0.txt" }, { "source": "cve@mitre.org", "url": "http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0134.html" }, { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=105301461726555\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://rhn.redhat.com/errata/RHSA-2003-088.html" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2003-098.html" }, { "source": "cve@mitre.org", "url": "http://security.gentoo.org/glsa/glsa-200303-17.xml" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2003/dsa-270" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2003/dsa-276" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2003/dsa-311" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2003/dsa-312" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2003/dsa-332" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2003/dsa-336" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2004/dsa-423" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2004/dsa-495" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/628849" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:038" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:039" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2003-103.html" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2003-145.html" }, { "source": "cve@mitre.org", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A254" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2003-020.0.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0134.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=105301461726555\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2003-088.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2003-098.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-200303-17.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2003/dsa-270" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2003/dsa-276" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2003/dsa-311" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2003/dsa-312" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2003/dsa-332" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2003/dsa-336" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2004/dsa-423" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2004/dsa-495" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/628849" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:038" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:039" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2003-103.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2003-145.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A254" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
gsd-2003-0127
Vulnerability from gsd
Modified
2023-12-13 01:22
Details
The kernel module loader in Linux kernel 2.2.x before 2.2.25, and 2.4.x before 2.4.21, allows local users to gain root privileges by using ptrace to attach to a child process that is spawned by the kernel.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2003-0127", "description": "The kernel module loader in Linux kernel 2.2.x before 2.2.25, and 2.4.x before 2.4.21, allows local users to gain root privileges by using ptrace to attach to a child process that is spawned by the kernel.", "id": "GSD-2003-0127", "references": [ "https://www.suse.com/security/cve/CVE-2003-0127.html", "https://www.debian.org/security/2004/dsa-495", "https://www.debian.org/security/2004/dsa-423", "https://www.debian.org/security/2003/dsa-336", "https://www.debian.org/security/2003/dsa-332", "https://www.debian.org/security/2003/dsa-312", "https://www.debian.org/security/2003/dsa-311", "https://www.debian.org/security/2003/dsa-276", "https://www.debian.org/security/2003/dsa-270", "https://access.redhat.com/errata/RHSA-2003:190", "https://access.redhat.com/errata/RHSA-2003:145", "https://access.redhat.com/errata/RHSA-2003:135", "https://access.redhat.com/errata/RHSA-2003:103", "https://access.redhat.com/errata/RHSA-2003:098", "https://access.redhat.com/errata/RHSA-2003:088" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2003-0127" ], "details": "The kernel module loader in Linux kernel 2.2.x before 2.2.25, and 2.4.x before 2.4.21, allows local users to gain root privileges by using ptrace to attach to a child process that is spawned by the kernel.", "id": "GSD-2003-0127", "modified": "2023-12-13T01:22:13.068377Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2003-0127", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The kernel module loader in Linux kernel 2.2.x before 2.2.25, and 2.4.x before 2.4.21, allows local users to gain root privileges by using ptrace to attach to a child process that is spawned by the kernel." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2003:103", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2003-103.html" }, { "name": "RHSA-2003:088", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2003-088.html" }, { "name": "DSA-270", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2003/dsa-270" }, { "name": "DSA-423", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2004/dsa-423" }, { "name": "RHSA-2003:098", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2003-098.html" }, { "name": "DSA-336", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2003/dsa-336" }, { "name": "CSSA-2003-020.0", "refsource": "CALDERA", "url": "ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2003-020.0.txt" }, { "name": "DSA-276", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2003/dsa-276" }, { "name": "ESA-20030515-017", "refsource": "ENGARDE", "url": "http://marc.info/?l=bugtraq\u0026m=105301461726555\u0026w=2" }, { "name": "MDKSA-2003:039", "refsource": "MANDRAKE", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:039" }, { "name": "DSA-495", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2004/dsa-495" }, { "name": "GLSA-200303-17", "refsource": "GENTOO", "url": "http://security.gentoo.org/glsa/glsa-200303-17.xml" }, { "name": "DSA-311", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2003/dsa-311" }, { "name": "DSA-332", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2003/dsa-332" }, { "name": "20030317 Fwd: Ptrace hole / Linux 2.2.25", "refsource": "VULNWATCH", "url": "http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0134.html" }, { "name": "oval:org.mitre.oval:def:254", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A254" }, { "name": "RHSA-2003:145", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2003-145.html" }, { "name": "MDKSA-2003:038", "refsource": "MANDRAKE", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:038" }, { "name": "DSA-312", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2003/dsa-312" }, { "name": "VU#628849", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/628849" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.2.15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.2.16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.2.22:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.2.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.2.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.2.20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.2.21:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.2.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.2.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.21:pre1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.2.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.2.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.2.19:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.2.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.2.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.2.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.2.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.11:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.19:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.2.23:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.2.9:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.2.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.2.17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.2.18:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.2.24:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.2.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.17:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.18:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.4.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2003-0127" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "The kernel module loader in Linux kernel 2.2.x before 2.2.25, and 2.4.x before 2.4.21, allows local users to gain root privileges by using ptrace to attach to a child process that is spawned by the kernel." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2003:098", "refsource": "REDHAT", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2003-098.html" }, { "name": "VU#628849", "refsource": "CERT-VN", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/628849" }, { "name": "RHSA-2003:088", "refsource": "REDHAT", "tags": [], "url": "http://rhn.redhat.com/errata/RHSA-2003-088.html" }, { "name": "DSA-270", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2003/dsa-270" }, { "name": "DSA-276", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2003/dsa-276" }, { "name": "DSA-311", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2003/dsa-311" }, { "name": "DSA-312", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2003/dsa-312" }, { "name": "DSA-332", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2003/dsa-332" }, { "name": "DSA-336", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2003/dsa-336" }, { "name": "DSA-423", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2004/dsa-423" }, { "name": "DSA-495", "refsource": "DEBIAN", "tags": [], "url": "http://www.debian.org/security/2004/dsa-495" }, { "name": "CSSA-2003-020.0", "refsource": "CALDERA", "tags": [], "url": "ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2003-020.0.txt" }, { "name": "RHSA-2003:145", "refsource": "REDHAT", "tags": [], "url": "http://www.redhat.com/support/errata/RHSA-2003-145.html" }, { "name": "GLSA-200303-17", "refsource": "GENTOO", "tags": [], "url": "http://security.gentoo.org/glsa/glsa-200303-17.xml" }, { "name": "20030317 Fwd: Ptrace hole / Linux 2.2.25", "refsource": "VULNWATCH", "tags": [], "url": "http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0134.html" }, { "name": "RHSA-2003:103", "refsource": "REDHAT", "tags": [], "url": "http://www.redhat.com/support/errata/RHSA-2003-103.html" }, { "name": "MDKSA-2003:038", "refsource": "MANDRAKE", "tags": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:038" }, { "name": "MDKSA-2003:039", "refsource": "MANDRAKE", "tags": [], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:039" }, { "name": "ESA-20030515-017", "refsource": "ENGARDE", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=105301461726555\u0026w=2" }, { "name": "oval:org.mitre.oval:def:254", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A254" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false } }, "lastModifiedDate": "2018-05-03T01:29Z", "publishedDate": "2003-03-31T05:00Z" } } }
ghsa-jhjp-mfjv-rvhx
Vulnerability from github
Published
2022-05-03 03:09
Modified
2022-05-03 03:09
VLAI Severity ?
Details
The kernel module loader in Linux kernel 2.2.x before 2.2.25, and 2.4.x before 2.4.21, allows local users to gain root privileges by using ptrace to attach to a child process that is spawned by the kernel.
{ "affected": [], "aliases": [ "CVE-2003-0127" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2003-03-31T05:00:00Z", "severity": "HIGH" }, "details": "The kernel module loader in Linux kernel 2.2.x before 2.2.25, and 2.4.x before 2.4.21, allows local users to gain root privileges by using ptrace to attach to a child process that is spawned by the kernel.", "id": "GHSA-jhjp-mfjv-rvhx", "modified": "2022-05-03T03:09:39Z", "published": "2022-05-03T03:09:39Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2003-0127" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A254" }, { "type": "WEB", "url": "http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0134.html" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=105301461726555\u0026w=2" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2003-088.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2003-098.html" }, { "type": "WEB", "url": "http://security.gentoo.org/glsa/glsa-200303-17.xml" }, { "type": "WEB", "url": "http://www.debian.org/security/2003/dsa-270" }, { "type": "WEB", "url": "http://www.debian.org/security/2003/dsa-276" }, { "type": "WEB", "url": "http://www.debian.org/security/2003/dsa-311" }, { "type": "WEB", "url": "http://www.debian.org/security/2003/dsa-312" }, { "type": "WEB", "url": "http://www.debian.org/security/2003/dsa-332" }, { "type": "WEB", "url": "http://www.debian.org/security/2003/dsa-336" }, { "type": "WEB", "url": "http://www.debian.org/security/2004/dsa-423" }, { "type": "WEB", "url": "http://www.debian.org/security/2004/dsa-495" }, { "type": "WEB", "url": "http://www.kb.cert.org/vuls/id/628849" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:038" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:039" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2003-103.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2003-145.html" } ], "schema_version": "1.4.0", "severity": [] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…