Description
The copy_from_user function in the uaccess code in Linux kernel 2.6 before 2.6.19-rc1, when running on s390, does not properly clear a kernel buffer, which allows local user space programs to read portions of kernel memory by "appending to a file from a bad address," which triggers a fault that prevents the unused memory from being cleared in the kernel buffer.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-1233-1 | New Linux 2.6.8 packages fix several vulnerabilities |
Debian DSA |
DSA-1237-1 | New Linux 2.4.27 packages fix several vulnerabilities |
EUVD |
EUVD-2006-5159 | The copy_from_user function in the uaccess code in Linux kernel 2.6 before 2.6.19-rc1, when running on s390, does not properly clear a kernel buffer, which allows local user space programs to read portions of kernel memory by "appending to a file from a bad address," which triggers a fault that prevents the unused memory from being cleared in the kernel buffer. |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T19:41:05.740Z
Reserved: 2006-10-05T00:00:00.000Z
Link: CVE-2006-5174
No data.
Status : Deferred
Published: 2006-10-10T04:06:00.000
Modified: 2025-04-09T00:30:58.490
Link: CVE-2006-5174
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
EUVD