Description of problem: Problem description from Nick Piggin: <cite> Hi, I have done an audit of some code and found security problems in several drivers and some core code as well. I have only verified it is a problem and patched it, but not explored the severity of the problem. However, it could be anything up to allowing a local user to have read/write access of arbitrary kernel memory. </cite> Acknowledgements: Red Hat would like to thank Nick Piggin for responsibly disclosing this issue.
Link to 2.6.23-stable review patch: http://lkml.org/lkml/2008/2/6/457 Link to kernel changelog: http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.22.17
CVE-2008-0007 description: Linux kernel before 2.6.22.17, when using certain drivers that register a fault handler that does not perform range checks, allows local users to access kernel memory via an out-of-range offset.
This issue already public -- see comment c#7 for more details.
This was addressed via: Red Hat Enterprise Linux version 3 (RHSA-2008:0211) Red Hat Enterprise Linux version 5 (RHSA-2008:023) Red Hat Enterprise Linux version 4 (RHSA-2008:0237) Red Hat Linux Advanced Workstation 2.1 (RHSA-2008:0787) Red Hat Enterprise Linux version 2.1 (RHSA-2009:0001)