1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
|
PublicDate: 2005-05-02
Candidate: CVE-2005-0529
References:
http://www.ubuntu.com/usn/usn-95-1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0529
Description:
Linux kernel 2.6.10 and 2.6.11rc1-bk6 uses different size types for offset
arguments to the proc_file_read and locks_read_proc functions, which leads
to a heap-based buffer overflow when a signed comparison causes negative
integers to be used in a positive context.
Ubuntu-Description:
Notes:
Bugs:
dapper_linux-source-2.6.15: released (2.6.15-29.58)
edgy_linux-source-2.6.15: DNE
feisty_linux-source-2.6.15: DNE
devel_linux-source-2.6.15: DNE
dapper_linux-source-2.6.17: DNE
edgy_linux-source-2.6.17: released (2.6.17.1-12.40)
feisty_linux-source-2.6.17: DNE
devel_linux-source-2.6.17: DNE
upstream_linux-source-2.6.15:
upstream_linux-source-2.6.17:
|