Out-of-bounds read in Linux kernel - CVE-2006-5174

 

Out-of-bounds read in Linux kernel - CVE-2006-5174

Published: October 10, 2006 / Updated: October 30, 2018


Vulnerability identifier: #VU95578
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2006-5174
CWE-ID: CWE-125
Exploitation vector: Local access
Exploit availability: No public exploit available
Vendor: Linux Foundation
Affected software:
Linux kernel

Detailed vulnerability description

The vulnerability allows a local user to gain access to sensitive information.

The copy_from_user function in the uaccess code in Linux kernel 2.6 before 2.6.19-rc1, when running on s390, does not properly clear a kernel buffer, which allows local user space programs to read portions of kernel memory by 'appending to a file from a bad address,' which triggers a fault that prevents the unused memory from being cleared in the kernel buffer. This vulnerability is addressed in the following product update: Linux, Linux kernel, 2.6.19 rc1


How to mitigate CVE-2006-5174

Install update from vendor's repository.

Sources