The copy_from_user function in the uaccess code in Linux kernel 2.6 before 2.6.19-rc1, when running on s390, does not properly clear a kernel buffer, which allows local user space programs to read portions of kernel memory by "appending to a file from a bad address," which triggers a fault that prevents the unused memory from being cleared in the kernel buffer.
Advisories
Source ID Title
Debian DSA Debian DSA DSA-1233-1 New Linux 2.6.8 packages fix several vulnerabilities
Debian DSA Debian DSA DSA-1237-1 New Linux 2.4.27 packages fix several vulnerabilities
EUVD EUVD EUVD-2006-5159 The copy_from_user function in the uaccess code in Linux kernel 2.6 before 2.6.19-rc1, when running on s390, does not properly clear a kernel buffer, which allows local user space programs to read portions of kernel memory by "appending to a file from a bad address," which triggers a fault that prevents the unused memory from being cleared in the kernel buffer.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-07T19:41:05.740Z

Reserved: 2006-10-05T00:00:00

Link: CVE-2006-5174

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2006-10-10T04:06:00.000

Modified: 2025-04-09T00:30:58.490

Link: CVE-2006-5174

cve-icon Redhat

Severity : Important

Publid Date: 2006-09-28T00:00:00Z

Links: CVE-2006-5174 - Bugzilla

cve-icon OpenCVE Enrichment

No data.