The copy_from_user function in the uaccess code in Linux kernel 2.6 before 2.6.19-rc1, when running on s390, does not properly clear a kernel buffer, which allows local user space programs to read portions of kernel memory by "appending to a file from a bad address," which triggers a fault that prevents the unused memory from being cleared in the kernel buffer.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
DSA-1233-1 | New Linux 2.6.8 packages fix several vulnerabilities |
![]() |
DSA-1237-1 | New Linux 2.4.27 packages fix several vulnerabilities |
![]() |
EUVD-2006-5159 | The copy_from_user function in the uaccess code in Linux kernel 2.6 before 2.6.19-rc1, when running on s390, does not properly clear a kernel buffer, which allows local user space programs to read portions of kernel memory by "appending to a file from a bad address," which triggers a fault that prevents the unused memory from being cleared in the kernel buffer. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T19:41:05.740Z
Reserved: 2006-10-05T00:00:00
Link: CVE-2006-5174

No data.

Status : Deferred
Published: 2006-10-10T04:06:00.000
Modified: 2025-04-09T00:30:58.490
Link: CVE-2006-5174


No data.