[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249966

 
 

909

 
 

195636

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2006-5174Date: (C)2006-10-10   (M)2023-12-22


The copy_from_user function in the uaccess code in Linux kernel 2.6 before 2.6.19-rc1, when running on s390, does not properly clear a kernel buffer, which allows local user space programs to read portions of kernel memory by "appending to a file from a bad address," which triggers a fault that prevents the unused memory from being cleared in the kernel buffer.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 2.1
Exploit Score: 3.9
Impact Score: 2.9
 
CVSS V2 Metrics:
Access Vector: LOCAL
Access Complexity: LOW
Authentication: NONE
Confidentiality: PARTIAL
Integrity: NONE
Availability: NONE
  
Reference:
SECTRACK-1017090
BID-20379
SECUNIA-22289
SECUNIA-22497
SECUNIA-23064
SECUNIA-23370
SECUNIA-23395
SECUNIA-23474
SECUNIA-23997
SECUNIA-24206
ADV-2006-3938
DSA-1233
DSA-1237
RHSA-2006:0710
RHSA-2007:0014
SUSE-SA:2006:079
http://lkml.org/lkml/2006/11/5/46
http://support.avaya.com/elmodocs2/security/ASA-2006-254.htm
http://support.avaya.com/elmodocs2/security/ASA-2007-063.htm
http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=52149ba6b0ddf3e9d965257cc0513193650b3ea8
kernel-copyfromuser-information-disclosure(29378)
oval:org.mitre.oval:def:9885

CPE    180
cpe:/o:linux:linux_kernel:2.6.4:rc1
cpe:/o:linux:linux_kernel:2.6.11.2
cpe:/o:linux:linux_kernel:2.6.11.3
cpe:/o:linux:linux_kernel:2.6.4:rc2
...

© SecPod Technologies