SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   OS (Linux)  >   Linux Kernel Vendors:   kernel.org
Linux Kernel 'uaccess' S/390 Code Discloses Kernel Memory to Local Users
SecurityTracker Alert ID:  1017090
SecurityTracker URL:  http://securitytracker.com/id/1017090
CVE Reference:   CVE-2006-5174   (Links to External Site)
Date:  Oct 19 2006
Impact:   Disclosure of system information, Disclosure of user information
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 2.6 prior to 2.6.19-rc1
Description:   A vulnerability was reported in the Linux kernel when running on S/390-based systems. A local user can view portions of kernel memory.

The copy_from_user() function in the S/390 uaccess code does not properly clear kernel buffer space in certain cases. A local user can append to a file from an incorrect address to trigger a fault and can then read uninitialized memory from the kernel buffer.

Impact:   A local user can view portions of kernel memory.
Solution:   The vendor has issued a fixed version (2.6.19-rc1).

A source code fix is also available:

http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=52149ba6b0ddf3e9d965257cc0513193650b3ea8

Vendor URL:  www.kernel.org/ (Links to External Site)
Cause:   Access control error, State error

Message History:   This archive entry has one or more follow-up message(s) listed below.
Oct 19 2006 (Red Hat Issues Fix) Linux Kernel 'uaccess' S/390 Code Discloses Kernel Memory to Local Users
Red Hat has released a fix for Red Hat Enterprise Linux 3.
Jan 30 2007 (Red Hat Issues Fix) Linux Kernel 'uaccess' S/390 Code Discloses Kernel Memory to Local Users
Red Hat has released a fix for Red Hat Enterprise Linux 4.



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, SecurityGlobal.net LLC