New Search

Linux kernel 2.6.10 and 2.6.11rc1-bk6 uses different size types for offset arguments to the proc_file_read and locks_read_proc functions which leads to a heap-based buffer overflow when a signed comparison causes negative integers to be used in a positive context.

oval:org.mitre.oval:def:8994

Linux kernel 2.6.10 and 2.6.11rc1-bk6 uses different size types for offset arguments to the proc_file_read and locks_read_proc functions which leads to a heap-based buffer overflow when a signed comparison causes negative integers to be used in a positive context.

Family:
unix
Status:
ACCEPTED
Platform(s):
  • Oracle Linux 4
  • CentOS Linux 4
  • Red Hat Enterprise Linux 4
Class:
vulnerability
Reference(s):
  • CVE-2005-0529
Product(s):