Ultra Monkey: High Availability and Load Balancing Solution for Linux [Monkey]
English | Japanese
Top | About | Mirrors | History | Contacts | Ultra Monkey 3 | Ultra Monkey 2.0.1 (Old)
News Archive | Papers | Ultra Monkey L7 [Japanese]

Ultra Monkey: Kernel Security Bug Database

CAN-2003-0001

prev up next
CVE CAN-2003-0001[offsite]
Updated Mon, 24 May 2004 20:44:10 +0900
Summary Multiple ethernet Network Interface Card (NIC) device drivers do not pad frames with null bytes, which allows remote attackers to obtain information from previous packets or kernel memory by using malformed packets, as demonstrated by Etherleak. (text:CAN-2003-0001)
Priority High
Status Closed
Source RHSA-2003:025-20 DSA-311-1
Link
Resolved In
  Kernel 2.4.21-pre5
  Patch Change Set 1.930.35.7[offsite] Change Set 1.930.9.43[offsite] Change Set 1.930.9.44[offsite] Change Set 1.930.9.45[offsite] Change Set 1.930.9.46[offsite] Change Set 1.930.9.47[offsite] Change Set 1.930.9.48[offsite] Change Set 1.930.9.49[offsite] Change Set 1.930.9.50[offsite] Change Set 1.930.9.51[offsite] Change Set 1.930.9.52[offsite] Change Set 1.930.9.53[offsite] Change Set 1.930.9.54[offsite] Change Set 1.930.9.55[offsite] Change Set 1.930.9.57[offsite] Change Set 1.930.9.58[offsite] Change Set 1.930.9.59[offsite] Change Set 1.930.9.60[offsite] Change Set 1.930.9.61[offsite] Change Set 1.930.9.62[offsite] Change Set 1.930.9.63[offsite] Change Set 1.930.9.64[offsite] Change Set 1.930.9.65[offsite] Change Set 1.930.9.66[offsite] Change Set 1.930.9.67[offsite] Change Set 1.930.9.68[offsite] Change Set 1.930.9.69[offsite] Change Set 1.930.9.70[offsite] Change Set 1.930.9.71[offsite] Change Set 1.930.9.72[offsite] Change Set 1.930.9.82[offsite] Change Set 1.930.9.84[offsite]
  Red Hat Linux 7.3
          Vendor kernel-2.4.18-24.7
          UltraMonkey kernel-2.4.20-18.7.um.1
  Red Hat Linux 8.0
          Vendor kernel-2.4.18-24.8
          UltraMonkey kernel-2.4.20-18.8.um.1
  Red Hat Linux 9
          Vendor kernel-2.4.20-8 (initial release)
          UltraMonkey kernel-2.4.20-19.9.um.1 (initial release)
  Fedora Core 1
          Vendor Not Vulnerable (>= 2.4.21-pre5)
          UltraMonkey Not Vulnerable (>= 2.4.21-pre5)
  Red Hat Enterprise Linux 3
          Vendor Not Vulnerable (>= 2.4.21-pre5)
          UltraMonkey Not Vulnerable (>= 2.4.21-pre5)
  Debian Woody
          Vendor kernel-source-2.4.18_2.4.18-7
          UltraMonkey 2.4.20-7.woody.um.1 (initial release)
  Debian Sid
          Vendor kernel-source-2.4.20_2.4.20-5
          UltraMonkey 2.4.20-7.sid.um.1 (initial release)
local data for debugging.
Information provided here is based on the information from the links above and is intended as a refereance only.



Copyright © 2000-2005, Horms
Last Updated: Sat, 04 Mar 2006 02:33:59 -0500

Debian is a registered trademark of Software in the Public Interest, Inc.
Red Hat, the Red Hat Shadowman logo and Fedora are registered trademarks of Red Hat, Inc.
Red Hat may also be refered to as RedHat on this site.
Linux is a registered trademark of Linus Torvalds.
All other trademarks are the property of their respective owners.