Vulnerability identifier: #VU95578
Vulnerability risk: Low
CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID:
CWE-ID:
CWE-125
Exploitation vector: Local
Exploit availability: No
Vulnerable software:
Linux kernel
Operating systems & Components /
Operating system
Vendor: Linux Foundation
Description
The vulnerability allows a local user to gain access to sensitive information.
The copy_from_user function in the uaccess code in Linux kernel 2.6 before 2.6.19-rc1, when running on s390, does not properly clear a kernel buffer, which allows local user space programs to read portions of kernel memory by 'appending to a file from a bad address,' which triggers a fault that prevents the unused memory from being cleared in the kernel buffer. This vulnerability is addressed in the following product update: Linux, Linux kernel, 2.6.19 rc1
Mitigation
Install update from vendor's repository.
Vulnerable software versions
Linux kernel: All versions
External links
https://lkml.org/lkml/2006/11/5/46
https://rhn.redhat.com/errata/RHSA-2007-0014.html
https://secunia.com/advisories/22289
https://secunia.com/advisories/22497
https://secunia.com/advisories/23064
https://secunia.com/advisories/23370
https://secunia.com/advisories/23395
https://secunia.com/advisories/23474
https://secunia.com/advisories/23997
https://secunia.com/advisories/24206
https://securitytracker.com/id?1017090
https://support.avaya.com/elmodocs2/security/ASA-2006-254.htm
https://support.avaya.com/elmodocs2/security/ASA-2007-063.htm
https://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=52149ba6b0ddf3e9d965257cc0513193650b3ea8
https://www.novell.com/linux/security/advisories/2006_79_kernel.html
https://www.redhat.com/support/errata/RHSA-2006-0710.html
https://www.securityfocus.com/bid/20379
https://www.us.debian.org/security/2006/dsa-1233
https://www.us.debian.org/security/2006/dsa-1237
https://www.vupen.com/english/advisories/2006/3938
https://exchange.xforce.ibmcloud.com/vulnerabilities/29378
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9885
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.