The ROSE protocol implementation in the Linux kernel prior to 2.6.39 does not verify that certain data-length values are consistent with the amount of data sent, which might allow remote malicious users to obtain sensitive information from kernel memory or cause a denial of service (out-of-bounds read) via crafted data to a ROSE socket.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
linux linux kernel 2.6.38 |
||
linux linux kernel 2.6.38.3 |
||
linux linux kernel |
||
linux linux kernel 2.6.38.6 |
||
linux linux kernel 2.6.38.1 |
||
linux linux kernel 2.6.38.5 |
||
linux linux kernel 2.6.38.2 |
||
linux linux kernel 2.6.38.4 |
||
linux linux kernel 2.6.38.7 |
||
novell suse linux enterprise server 10.0 |