Heap-based Buffer Overflow in Linux Kernel 2.6.10 and 2.6.11rc1-bk6 due to Inconsistent Size Types

Heap-based Buffer Overflow in Linux Kernel 2.6.10 and 2.6.11rc1-bk6 due to Inconsistent Size Types

CVE-2005-0529 · LOW Severity

AV:L/AC:L/AU:N/C:P/I:N/A:N

Linux kernel 2.6.10 and 2.6.11rc1-bk6 uses different size types for offset arguments to the proc_file_read and locks_read_proc functions, which leads to a heap-based buffer overflow when a signed comparison causes negative integers to be used in a positive context.

Learn more about our Web Application Penetration Testing UK.