[kernel-sec-discuss] r610 - active

Martin Pitt mpitt at costa.debian.org
Tue Oct 10 10:07:45 UTC 2006


Author: mpitt
Date: 2006-10-10 10:07:44 +0000 (Tue, 10 Oct 2006)
New Revision: 610

Modified:
   active/CVE-2006-5174
Log:
flesh out CVE-2006-5174

Modified: active/CVE-2006-5174
===================================================================
--- active/CVE-2006-5174	2006-10-10 10:05:01 UTC (rev 609)
+++ active/CVE-2006-5174	2006-10-10 10:07:44 UTC (rev 610)
@@ -1,14 +1,21 @@
 Candidate: CVE-2006-5174 
 References: 
+ http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=52149ba6b0ddf3e9d965257cc0513193650b3ea8
 Description: 
+ The copy_from_user function in the uaccess code in Linux kernel 2.6
+ before 2.6.19-rc1, when running on s390, does not properly clear a
+ kernel buffer, which allows local user space programs to read
+ portions of kernel memory by "appending to a file from a bad
+ address," which triggers a fault that prevents the unused memory from
+ being cleared in the kernel buffer. 
 Ubuntu-Description:
 Notes: 
 Bugs: 
 upstream: 
 linux-2.6:
-2.6.8-sarge-security: 
+2.6.8-sarge-security: needed
 2.4.27-sarge-security: needed
-2.6.10-hoary-security:
-2.6.12-breezy-security:
-2.6.15-dapper-security:
-2.6.17-edgy:
+2.6.10-hoary-security: ignored
+2.6.12-breezy-security: ignored
+2.6.15-dapper-security: ignored
+2.6.17-edgy: ignored




More information about the kernel-sec-discuss mailing list