Linux kernel RTC memory link

linux-rtc-memory-leak (13943) The risk level is classified as MediumMedium Risk

Description:

Linux kernel could allow a remote attacker to obtain sensitive information, caused by a vulnerability when handling Real Time Clock (RTC) routines.


Consequences:

Obtain Information

Remedy:

For SuSE Linux:
Upgrade to the latest kernel package, as listed below. Refer to SuSE Security Advisory SuSE-SA:2003:049 for more information. See References.

SuSE Linux 9.0 (Intel): 2.4.21-144 or later
SuSE Linux 8.2: 2.4.20-101 or later
SuSE Linux 8.1: 2.4.21-151 or later
SuSE Linux 8.0 and 7.3: 2.4.18-281 or later
SuSE Linux 9.0 (x86_64): 2.4.21-149 or later

For Red Hat Linux:
Upgrade to the latest kernel package, as listed below. Refer to RHSA-2003:417-08 for more information. See References.

Red Hat Linux 7.1, 7.2, and 7.3: 2.4.20-28.7 or later
Red Hat Linux 8.0: 2.4.20-28.8 or later
Red Hat Linux 9: 2.4.20-28.9 or later

For Mandrake Linux:
Upgrade to the latest kernel package, as listed below. Refer to MandrakeSoft Security Advisory MDKSA-2004:001 : kernel for more information. See References.

Mandrake Linux 9.0 and Multi Network Firewall 8.2: 2.4.19.37mdk-1-1mdk or later
Mandrake Linux 9.1: 2.4.21.0.27mdk-1-1mdk or later
Mandrake Linux 9.2: 2.4.22.26mdk-1-1mdk or later
Mandrake Linux Coporate Server 2.1: 2.4.19.34mdk-1-1mdk or later

For SmoothWall Express 2.0:
Apply the SmoothWall Express 2.0 fixes1 patch, as listed in SmoothWall Project Security Advisory SWP-2004:001. See References.

For Turbolinux:
Upgrade to the latest kernel package, as listed below. Refer to Turbolinux Security Advisory TLSA-2004-14 for more information. See References.

Turbolinux Appliance Server 1.0 Hosting Edition: 2.4.25-3 or later
Turbolinux 10 Desktop: 2.6.0-8 or later
Turbolinux 8 Server or Workstation: 2.4.18-19 or later
Turbolinux 7 Server or Workstation: 2.4.18-19 or later

For Debian GNU/Linux:
Refer to DSA-1070-1, DSA-1069-1, DSA-1067-1, or DSA-1082-1 for patch, upgrade, or suggested workaround information. See References.

For other distributions:
Contact your vendor for upgrade or patch information.

References:

  • CIAC Information Bulletin O-045: Red Hat 'mremap()' function Vulnerability.
  • CIAC Information Bulletin O-145: Red Hat Updated Kernel Packages for Enterprise Linux 3.
  • SmoothWall Project Security Advisory SWP-2004:001: Updates for SmoothWall Express to correct local vulnerabilities in Linux kernel.
  • BID-9154: Linux Kernel 2.4 RTC Handling Routines Memory Disclosure Vulnerability
  • CVE-2003-0984: Real time clock (RTC) routines in Linux kernel 2.4.23 and earlier do not properly initialize their structures, which could leak kernel data to user space.
  • DSA-1067: kernel-source-2.4.16 -- several vulnerabilities
  • DSA-1069: kernel-source-2.4.18 -- several vulnerabilities
  • DSA-1070: kernel-source-2.4.19 -- several vulnerabilities
  • DSA-1082: kernel-source-2.4.17 -- several vulnerabilities
  • MDKSA-2004:001: Updated kernel packages fix local root vulnerability
  • OSVDB ID: 3317: Linux Kernel Real Time Clock Kernel Memory Disclosure
  • RHSA-2003-417: Updated kernel resolves security vulnerability
  • RHSA-2004-188: Updated kernel packages available for Red Hat Enterprise Linux 3 Update 2
  • SA10533: Linux Kernel Real Time Clock Kernel Memory Disclosure Vulnerability
  • SECTRACK ID: 1008594: Linux Kernel Real-time Clock Routines May Leak Kernel Data to User Applications

Platforms Affected:

  • Debian Debian Linux 3.0
  • Linux Kernel 2.4.0 test7
  • Linux Kernel 2.4.0 test9
  • Linux Kernel 2.4.0 test5
  • Linux Kernel 2.4.0 test4
  • Linux Kernel 2.4.0 test3
  • Linux Kernel 2.4.0 test2
  • Linux Kernel 2.4.0 test12
  • Linux Kernel 2.4.0 test11
  • Linux Kernel 2.4.0 test10
  • Linux Kernel 2.4.0 test1
  • Linux Kernel 2.4.0 test6
  • Linux Kernel 2.4.0 test8
  • Linux Kernel 2.4.0
  • Linux Kernel 2.4.1
  • Linux Kernel 2.4.10
  • Linux Kernel 2.4.11
  • Linux Kernel 2.4.12
  • Linux Kernel 2.4.13
  • Linux Kernel 2.4.14
  • Linux Kernel 2.4.15
  • Linux Kernel 2.4.16
  • Linux Kernel 2.4.17
  • Linux Kernel 2.4.18
  • Linux Kernel 2.4.18 x86
  • Linux Kernel 2.4.18 pre8
  • Linux Kernel 2.4.18 pre7
  • Linux Kernel 2.4.18 pre6
  • Linux Kernel 2.4.18 pre5
  • Linux Kernel 2.4.18 pre4
  • Linux Kernel 2.4.18 pre3
  • Linux Kernel 2.4.18 pre2
  • Linux Kernel 2.4.18 pre1
  • Linux Kernel 2.4.19 pre2
  • Linux Kernel 2.4.19 pre5
  • Linux Kernel 2.4.19
  • Linux Kernel 2.4.19 pre1
  • Linux Kernel 2.4.19 pre6
  • Linux Kernel 2.4.19 pre3
  • Linux Kernel 2.4.19 pre4
  • Linux Kernel 2.4.2
  • Linux Kernel 2.4.20
  • Linux Kernel 2.4.21 pre1
  • Linux Kernel 2.4.21 pre7
  • Linux Kernel 2.4.21 pre4
  • Linux Kernel 2.4.21
  • Linux Kernel 2.4.22
  • Linux Kernel 2.4.3
  • Linux Kernel 2.4.4
  • Linux Kernel 2.4.5
  • Linux Kernel 2.4.6
  • Linux Kernel 2.4.7
  • Linux Kernel 2.4.8
  • Linux Kernel 2.4.9
  • MandrakeSoft Mandrake Linux 9.0
  • MandrakeSoft Mandrake Linux 9.1
  • MandrakeSoft Mandrake Linux 9.1 PPC
  • MandrakeSoft Mandrake Linux 9.2
  • MandrakeSoft Mandrake Linux 9.2 AMD64
  • MandrakeSoft Mandrake Linux Corporate Server 2.1
  • MandrakeSoft Mandrake Linux Corporate Server 2.1 X86_64
  • MandrakeSoft Mandrake Multi Network Firewall 8.2
  • Novell SuSE Linux Enterprise Server 7.0
  • RedHat Enterprise Linux 3 AS
  • RedHat Enterprise Linux 3 ES
  • RedHat Enterprise Linux 3 WS
  • RedHat Linux 7.1
  • RedHat Linux 7.2
  • RedHat Linux 7.3
  • RedHat Linux 8.0
  • RedHat Linux 9.0
  • SmoothWall SmoothWall Express 2.0
  • SuSE SuSE eMail Server 3.1
  • SuSE SuSE eMail Server III
  • SUSE SuSE Linux 7.3
  • SUSE SuSE Linux 8.0
  • SUSE SuSE Linux 8.1
  • SUSE SuSE Linux 8.2
  • SUSE SuSE Linux 9.0
  • SuSE SuSE Linux Database Server
  • SuSE SuSE Linux Firewall
  • SuSE SuSE Linux Office Server
  • SuSE SuSE Linux School Server
  • Turbolinux Turbolinux 10 Desktop
  • Turbolinux Turbolinux 7 Server
  • Turbolinux Turbolinux 7 Workstation
  • Turbolinux Turbolinux 8 Server
  • Turbolinux Turbolinux 8 Workstation
  • Turbolinux Turbolinux Appliance Server 1.0
  • Turbolinux Turbolinux Appliance Server 1.0 Hosting Ed
  • Turbolinux Turbolinux Appliance Server 1.0 Workgroup Ed

Reported:

Dec 04, 2003

The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor (IBM Internet Security Systems X-Force) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.

For corrections or additions please email ignore thisxforceignore this@ignore thisus.ignore thisibm.comignore this

Return to the main page