Description of problem:
Problem description from Nick Piggin:
I have done an audit of some code and found security problems in several
drivers and some core code as well. I have only verified it is a problem and
patched it, but not explored the severity of the problem. However, it could be
anything up to allowing a local user to have read/write access of arbitrary
Red Hat would like to thank Nick Piggin for responsibly disclosing this issue.
Link to 2.6.23-stable review patch:
Link to kernel changelog:
Linux kernel before 188.8.131.52, when using certain drivers that register a fault
handler that does not perform range checks, allows local users to access kernel
memory via an out-of-range offset.
This issue already public -- see comment c#7 for more details.
This was addressed via:
Red Hat Enterprise Linux version 3 (RHSA-2008:0211)
Red Hat Enterprise Linux version 5 (RHSA-2008:023)
Red Hat Enterprise Linux version 4 (RHSA-2008:0237)
Red Hat Linux Advanced Workstation 2.1 (RHSA-2008:0787)
Red Hat Enterprise Linux version 2.1 (RHSA-2009:0001)