2.1
CVSSv2

CVE-2005-0529

Published: 02/05/2005 Updated: 13/02/2023
CVSS v2 Base Score: 2.1 | Impact Score: 2.9 | Exploitability Score: 3.9
VMScore: 187
Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

Linux kernel 2.6.10 and 2.6.11rc1-bk6 uses different size types for offset arguments to the proc_file_read and locks_read_proc functions, which leads to a heap-based buffer overflow when a signed comparison causes negative integers to be used in a positive context.

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel 2.6.11_rc1_bk6

linux linux kernel 2.6.10

Vendor Advisories

Synopsis kernel security update Type/Severity Security Advisory: Important Topic Updated kernel packages that fix several security issues are now availablefor Red Hat Enterprise Linux 4This update has been rated as having important security impact by the RedHat Security Response Team[Updated 9 August 2005 ...
A remote Denial of Service vulnerability was discovered in the Netfilter IP packet handler This allowed a remote attacker to crash the machine by sending specially crafted IP packet fragments (CAN-2005-0209) ...