Vulnerability Description
The fill_write_buffer function in sysfs/file.c in Linux kernel 2.6.12 up to versions before 2.6.17-rc1 does not zero terminate a buffer when a length of PAGE_SIZE or more is requested, which might allow local users to cause a denial of service (crash) by causing an out-of-bounds read.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | 2.6.12 |
References
- http://lwn.net/Alerts/180820/
- http://secunia.com/advisories/19495
- http://secunia.com/advisories/19735
- http://secunia.com/advisories/19955
- http://secunia.com/advisories/20398
- http://secunia.com/advisories/20716
- http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%
- http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitd
- http://www.novell.com/linux/security/advisories/2006-05-31.html
- http://www.osvdb.org/24443
- http://www.securityfocus.com/bid/17402
- http://www.trustix.org/errata/2006/0020
- http://www.ubuntu.com/usn/usn-302-1
- http://www.vupen.com/english/advisories/2006/1273
- http://www.vupen.com/english/advisories/2006/1475
FAQ
What is CVE-2006-1055?
CVE-2006-1055 is a vulnerability with a CVSS score of 4.9 (MEDIUM). The fill_write_buffer function in sysfs/file.c in Linux kernel 2.6.12 up to versions before 2.6.17-rc1 does not zero terminate a buffer when a length of PAGE_SIZE or more is requested, which might all...
How severe is CVE-2006-1055?
CVE-2006-1055 has been rated MEDIUM with a CVSS base score of 4.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-1055?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.