New Search

The copy_from_user function in the uaccess code in Linux kernel 2.6 before 2.6.19-rc1 when running on s390 does not properly clear a kernel buffer which allows local user space programs to read portions of kernel memory by "appending to a file from a bad address" which triggers a fault that prevents the unused memory from being cleared in the kernel buffer.

oval:org.mitre.oval:def:9885

The copy_from_user function in the uaccess code in Linux kernel 2.6 before 2.6.19-rc1 when running on s390 does not properly clear a kernel buffer which allows local user space programs to read portions of kernel memory by "appending to a file from a bad address" which triggers a fault that prevents the unused memory from being cleared in the kernel buffer.

Family:
unix
Status:
ACCEPTED
Platform(s):
  • CentOS Linux 3
  • Red Hat Enterprise Linux 4
  • Oracle Linux 4
  • CentOS Linux 4
  • Red Hat Enterprise Linux 3
Class:
vulnerability
Reference(s):
  • CVE-2006-5174
Product(s):