Oval Definition:oval:org.mitre.oval:def:8994
Revision Date:2013-04-29Version:11
Title:Linux kernel 2.6.10 and 2.6.11rc1-bk6 uses different size types for offset arguments to the proc_file_read and locks_read_proc functions, which leads to a heap-based buffer overflow when a signed comparison causes negative integers to be used in a positive context.
Description:Linux kernel 2.6.10 and 2.6.11rc1-bk6 uses different size types for offset arguments to the proc_file_read and locks_read_proc functions, which leads to a heap-based buffer overflow when a signed comparison causes negative integers to be used in a positive context.
Family:unixClass:vulnerability
Status:ACCEPTEDReference(s):CVE-2005-0529
Platform(s):CentOS Linux 4
Oracle Linux 4
Red Hat Enterprise Linux 4
Product(s):
Definition Synopsis
  • RHEL4, CentOS4 or Oracle Linux 4
  • The operating system installed on the system is Red Hat Enterprise Linux 4
  • OR CentOS Linux 4.x
  • OR Oracle Linux 4.x
  • AND Configuration section
  • kernel-smp-devel is earlier than 0:2.6.9-5.0.5.EL
  • OR kernel-hugemem is earlier than 0:2.6.9-5.0.5.EL
  • OR kernel-devel is earlier than 0:2.6.9-5.0.5.EL
  • OR kernel is earlier than 0:2.6.9-5.0.5.EL
  • OR kernel-hugemem-devel is earlier than 0:2.6.9-5.0.5.EL
  • OR kernel-doc is earlier than 0:2.6.9-5.0.5.EL
  • OR kernel-smp is earlier than 0:2.6.9-5.0.5.EL
  • BACK