Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-wqgc-ghqv-pj27

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Linux kernel 2.6.10 and 2.6.11rc1-bk6 uses different size types for offset arguments to the proc_file_read and locks_read_proc functions, which leads to a heap-based buffer overflow when a signed comparison causes negative integers to be used in a positive context.

Linux kernel 2.6.10 and 2.6.11rc1-bk6 uses different size types for offset arguments to the proc_file_read and locks_read_proc functions, which leads to a heap-based buffer overflow when a signed comparison causes negative integers to be used in a positive context.

EPSS

Процентиль: 25%
0.00084
Низкий

Связанные уязвимости

ubuntu
больше 20 лет назад

Linux kernel 2.6.10 and 2.6.11rc1-bk6 uses different size types for offset arguments to the proc_file_read and locks_read_proc functions, which leads to a heap-based buffer overflow when a signed comparison causes negative integers to be used in a positive context.

redhat
больше 20 лет назад

Linux kernel 2.6.10 and 2.6.11rc1-bk6 uses different size types for offset arguments to the proc_file_read and locks_read_proc functions, which leads to a heap-based buffer overflow when a signed comparison causes negative integers to be used in a positive context.

nvd
больше 20 лет назад

Linux kernel 2.6.10 and 2.6.11rc1-bk6 uses different size types for offset arguments to the proc_file_read and locks_read_proc functions, which leads to a heap-based buffer overflow when a signed comparison causes negative integers to be used in a positive context.

debian
больше 20 лет назад

Linux kernel 2.6.10 and 2.6.11rc1-bk6 uses different size types for of ...

EPSS

Процентиль: 25%
0.00084
Низкий