#VU95578 Out-of-bounds read in Linux kernel - CVE-2006-5174


| Updated: 2018-10-30

Vulnerability identifier: #VU95578

Vulnerability risk: Low

CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2006-5174

CWE-ID: CWE-125

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
Linux kernel
Operating systems & Components / Operating system

Vendor: Linux Foundation

Description

The vulnerability allows a local user to gain access to sensitive information.

The copy_from_user function in the uaccess code in Linux kernel 2.6 before 2.6.19-rc1, when running on s390, does not properly clear a kernel buffer, which allows local user space programs to read portions of kernel memory by 'appending to a file from a bad address,' which triggers a fault that prevents the unused memory from being cleared in the kernel buffer. This vulnerability is addressed in the following product update: Linux, Linux kernel, 2.6.19 rc1

Mitigation
Install update from vendor's repository.

Vulnerable software versions

Linux kernel: All versions


External links
https://lkml.org/lkml/2006/11/5/46
https://rhn.redhat.com/errata/RHSA-2007-0014.html
https://secunia.com/advisories/22289
https://secunia.com/advisories/22497
https://secunia.com/advisories/23064
https://secunia.com/advisories/23370
https://secunia.com/advisories/23395
https://secunia.com/advisories/23474
https://secunia.com/advisories/23997
https://secunia.com/advisories/24206
https://securitytracker.com/id?1017090
https://support.avaya.com/elmodocs2/security/ASA-2006-254.htm
https://support.avaya.com/elmodocs2/security/ASA-2007-063.htm
https://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=52149ba6b0ddf3e9d965257cc0513193650b3ea8
https://www.novell.com/linux/security/advisories/2006_79_kernel.html
https://www.redhat.com/support/errata/RHSA-2006-0710.html
https://www.securityfocus.com/bid/20379
https://www.us.debian.org/security/2006/dsa-1233
https://www.us.debian.org/security/2006/dsa-1237
https://www.vupen.com/english/advisories/2006/3938
https://exchange.xforce.ibmcloud.com/vulnerabilities/29378
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9885


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability