"value":"The print_fatal_signal function in kernel/signal.c in the Linux kernel before 2.6.32.4 on the i386 platform, when print-fatal-signals is enabled, allows local users to discover the contents of arbitrary memory locations by jumping to an address and then reading a log file, and might allow local users to cause a denial of service (system slowdown or crash) by jumping to an address."
},
{
"lang":"es",
"value":"La funci\u00f3n print_fatal_signal en kernel/signal.c en el kernel de Linux en versiones anteriores a v2.6.32.4 en plataformas i386, cuando print-fatal-signals esta activado, permite a usuarios locales descubrir los contenidos de zonas arbitrarias de memoria mediante saltos a una direcciones y despu\u00e9s leyendo un fichero de log, y permitir\u00eda a usuarios locales producir una denegaci\u00f3n de servicio (ralentizaci\u00f3n o ca\u00edda del sistema) mediante saltos a una direcci\u00f3n."
}
],
"vendorComments":[
{
"organization":"Red Hat",
"comment":"Red Hat is aware of this issue and is tracking it via the following bug:\nhttps://bugzilla.redhat.com/CVE-2010-0003.\n\nThis issue has been rated as having moderate security impact.\n\nA future update in Red Hat Enterprise MRG may address this flaw. This issue was addressed in Red Hat Enterprise Linux 4 and 5 via https://rhn.redhat.com/errata/RHSA-2010-0146.html and https://rhn.redh\nat.com/errata/RHSA-2010-0147.html respectively.\n\nThis issue is not planned to be fixed in Red Hat Enterprise Linux 3, due to this product being in Production 3 of its maintenance life-cycle, where only qualified security errata of important or criti\ncal impact are addressed.\n\nFor further information about Errata Support Policy, visit: http://www.redhat.com/security/updates/errata/\n",