CVE-2011-3588
Published: 15 February 2014
The SSH configuration in the Red Hat mkdumprd script for kexec-tools, as distributed in the kexec-tools 1.x before 1.102pre-154 and 2.x before 2.0.0-209 packages in Red Hat Enterprise Linux, disables the StrictHostKeyChecking option, which allows man-in-the-middle attackers to spoof kdump servers, and obtain sensitive core information, by using an arbitrary SSH key.
Notes
Author | Note |
---|---|
mdeslaur | mkdumprd is RedHat-specific, marking as not-affected |
Priority
Status
Package | Release | Status |
---|---|---|
kexec-tools Launchpad, Ubuntu, Debian |
hardy |
Not vulnerable
(code not present)
|
lucid |
Not vulnerable
(code not present)
|
|
maverick |
Not vulnerable
(code not present)
|
|
natty |
Not vulnerable
(code not present)
|
|
oneiric |
Not vulnerable
(code not present)
|
|
upstream |
Needs triage
|