First published: Fri Jun 24 2011(Updated: )
Multiple security flaws were found in the way kexec-tools performed management of created kdump core files and ramdisk images: * the default value of "StrictHostKeyChecking=no" has been used for kdump / mkdumprd openssh integration. A remote malicious kdump server could use this flaw to impersonate the intended, correct kdump server to obtain security sensitive information (kdump core files), * mkdumprd utility copied content of certain directories into newly created initial ramdisk images, potentially leading to information leak, * mkdumprd utility created the final initial ramdisk image with world-readable permissions, possibly leading to information leak. Acknowledgements: Red Hat would like to thank Kevan Carstensen for reporting this issue.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Kexec-tools | <=2.0.0-188 | |
Redhat Kexec-tools | <=1.102pre-126 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.