]> git.kernelconcepts.de Git - karo-tx-linux.git/commit
[S390] fix user readable uninitialised kernel memory (CVE-2006-5174)
authorMartin Schwidefsky <schwidefsky@de.ibm.com>
Sun, 5 Nov 2006 07:01:53 +0000 (08:01 +0100)
committerAdrian Bunk <bunk@stusta.de>
Sun, 5 Nov 2006 07:01:53 +0000 (08:01 +0100)
commitdfa2e9e76edadc584a0da6966aa081527dad1372
treefcea4cdb377bd60e25c792c912a750b7fecceee6
parent143144b7ecdebce0ac5a5e5bd211555f659a3025
[S390] fix user readable uninitialised kernel memory (CVE-2006-5174)

A user space program can read uninitialised kernel memory
by appending to a file from a bad address and then reading
the result back. The cause is the copy_from_user function
that does not clear the remaining bytes of the kernel
buffer after it got a fault on the user space address.

Signed-off-by: Martin Schwidefsky <schwidefsky@de.ibm.com>
Signed-off-by: Adrian Bunk <bunk@stusta.de>
arch/s390/lib/uaccess.S
arch/s390/lib/uaccess64.S