diff options
author | Martin Schwidefsky <schwidefsky@de.ibm.com> | 2006-11-05 08:01:53 +0100 |
---|---|---|
committer | Adrian Bunk <bunk@stusta.de> | 2006-11-05 08:01:53 +0100 |
commit | dfa2e9e76edadc584a0da6966aa081527dad1372 (patch) | |
tree | fcea4cdb377bd60e25c792c912a750b7fecceee6 /arch/frv | |
parent | 143144b7ecdebce0ac5a5e5bd211555f659a3025 (diff) |
[S390] fix user readable uninitialised kernel memory (CVE-2006-5174)
A user space program can read uninitialised kernel memory
by appending to a file from a bad address and then reading
the result back. The cause is the copy_from_user function
that does not clear the remaining bytes of the kernel
buffer after it got a fault on the user space address.
Signed-off-by: Martin Schwidefsky <schwidefsky@de.ibm.com>
Signed-off-by: Adrian Bunk <bunk@stusta.de>
Diffstat (limited to 'arch/frv')
0 files changed, 0 insertions, 0 deletions