CVE-2003-0461

NameCVE-2003-0461
Description/proc/tty/driver/serial in Linux 2.4.x reveals the exact number of characters used in serial links, which could allow local users to obtain potentially sensitive information such as the length of passwords.
SourceCVE (at NVD; oss-sec, fulldisc, OSVDB, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, more)
ReferencesDSA-358, DSA-423
NVD severitylow (attack range: local)
Debian/oldstablenot vulnerable.
Debian/stablenot known to be vulnerable.
Debian/testingnot known to be vulnerable.
Debian/unstablenot known to be vulnerable.

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
linux-2.6 (PTS)squeeze (security), squeeze2.6.32-48squeeze6fixed
squeeze (lts)2.6.32-48squeeze11fixed

The information above is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
kernel-image-2.4.17-ia64sourcewoodykernel-image-2.4.17-ia64lowDSA-423
kernel-image-2.4.18-1-alphasourcewoody2.4.18-10.lowDSA-358
kernel-image-2.4.18-1-i386sourcewoody2.4.18-11lowDSA-358
kernel-image-2.4.18-i386bfsourcewoody2.4.18-5woody4lowDSA-358
kernel-source-2.4.18sourcewoody2.4.18-13lowDSA-358
kernel-source-2.4.27source(unstable)2.4.27-1low
kernel-source-2.6.8sourcesarge(not affected)
linux-2.6source(unstable)(not affected)

Notes

[sarge] - kernel-source-2.6.8 <not-affected> (Fixed before upload into archive; 2.6.1)
- linux-2.6 <not-affected> (Fixed before upload into archive; 2.6.1)

Search for package or bug name: Reporting problems