Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2005-0529

Опубликовано: 15 фев. 2005
Источник: redhat
EPSS Низкий

Описание

Linux kernel 2.6.10 and 2.6.11rc1-bk6 uses different size types for offset arguments to the proc_file_read and locks_read_proc functions, which leads to a heap-based buffer overflow when a signed comparison causes negative integers to be used in a positive context.

Дополнительная информация

Статус:

Moderate

EPSS

Процентиль: 25%
0.00084
Низкий

Связанные уязвимости

ubuntu
больше 20 лет назад

Linux kernel 2.6.10 and 2.6.11rc1-bk6 uses different size types for offset arguments to the proc_file_read and locks_read_proc functions, which leads to a heap-based buffer overflow when a signed comparison causes negative integers to be used in a positive context.

nvd
больше 20 лет назад

Linux kernel 2.6.10 and 2.6.11rc1-bk6 uses different size types for offset arguments to the proc_file_read and locks_read_proc functions, which leads to a heap-based buffer overflow when a signed comparison causes negative integers to be used in a positive context.

debian
больше 20 лет назад

Linux kernel 2.6.10 and 2.6.11rc1-bk6 uses different size types for of ...

github
больше 3 лет назад

Linux kernel 2.6.10 and 2.6.11rc1-bk6 uses different size types for offset arguments to the proc_file_read and locks_read_proc functions, which leads to a heap-based buffer overflow when a signed comparison causes negative integers to be used in a positive context.

EPSS

Процентиль: 25%
0.00084
Низкий