Multiple vulnerabilities were discovered and fixed in the Linux
CAN-2003-0001: Multiple ethernet network card drivers do not
pad frames with null bytes which allows remote attackers to obtain
information from previous packets or kernel memory by using special
CAN-2003-0244: The route cache implementation in the 2.4 kernel
and the Netfilter IP conntrack module allows remote attackers to
cause a Denial of Service (DoS) via CPU consumption due to packets
with forged source addresses that cause a large number of hash
table collisions related to the PREROUTING chain.
CAN-2003-0246: The ioperm implementation in 2.4.20 and earlier
kernels does not properly restrict privileges, which allows local
users to gain read or write access to certain I/O ports.
CAN-2003-0247: A vulnerability in the TTY layer of the 2.4
kernel allows attackers to cause a kernel oops resulting in a
CAN-2003-0248: The mxcsr code in the 2.4 kernel allows
attackers to modify CPU state registers via a malformed
CAN-2003-0462: A file read race existed in the execve() system
As well, a number of bug fixes were made in the 9.1 kernel
Support for more machines that did not work with APIC
The kernels provided in MDKSA-2003:066-1 (2.4.21-0.24mdk) had a
problem where all files created on any filesystem other than XFS,
and using any kernel other than kernel-secure, would be created
with mode 0666, or world writeable. The 0.24mdk kernels have been
removed from the mirrors and users are encouraged to upgrade and
remove those kernels from their systems to prevent accidentally
booting into them.
That issue has been addressed and fixed with these new
Some of the products that appear on this site are from companies from which QuinStreet receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. QuinStreet does not include all companies or all types of products available in the marketplace.