~ubuntu-security/ubuntu-cve-tracker/master

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
PublicDate: 2005-05-02
Candidate: CVE-2005-0529
References:
 http://www.ubuntu.com/usn/usn-95-1
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0529
Description:
 Linux kernel 2.6.10 and 2.6.11rc1-bk6 uses different size types for offset
 arguments to the proc_file_read and locks_read_proc functions, which leads
 to a heap-based buffer overflow when a signed comparison causes negative
 integers to be used in a positive context.
Ubuntu-Description:
Notes:
Bugs:
dapper_linux-source-2.6.15: released (2.6.15-29.58)
edgy_linux-source-2.6.15: DNE
feisty_linux-source-2.6.15: DNE
devel_linux-source-2.6.15: DNE
dapper_linux-source-2.6.17: DNE
edgy_linux-source-2.6.17: released (2.6.17.1-12.40)
feisty_linux-source-2.6.17: DNE
devel_linux-source-2.6.17: DNE
upstream_linux-source-2.6.15: 
upstream_linux-source-2.6.17: