Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2005-0529

Опубликовано: 02 мая 2005
Источник: ubuntu
Приоритет: untriaged
EPSS Низкий
CVSS2: 2.1

Описание

Linux kernel 2.6.10 and 2.6.11rc1-bk6 uses different size types for offset arguments to the proc_file_read and locks_read_proc functions, which leads to a heap-based buffer overflow when a signed comparison causes negative integers to be used in a positive context.

РелизСтатусПримечание
dapper

released

2.6.15-29.58
devel

DNE

edgy

DNE

feisty

DNE

upstream

needs-triage

Показывать по

РелизСтатусПримечание
dapper

DNE

devel

DNE

edgy

released

2.6.17.1-12.40
feisty

DNE

upstream

needs-triage

Показывать по

EPSS

Процентиль: 25%
0.00084
Низкий

2.1 Low

CVSS2

Связанные уязвимости

redhat
больше 20 лет назад

Linux kernel 2.6.10 and 2.6.11rc1-bk6 uses different size types for offset arguments to the proc_file_read and locks_read_proc functions, which leads to a heap-based buffer overflow when a signed comparison causes negative integers to be used in a positive context.

nvd
больше 20 лет назад

Linux kernel 2.6.10 and 2.6.11rc1-bk6 uses different size types for offset arguments to the proc_file_read and locks_read_proc functions, which leads to a heap-based buffer overflow when a signed comparison causes negative integers to be used in a positive context.

debian
больше 20 лет назад

Linux kernel 2.6.10 and 2.6.11rc1-bk6 uses different size types for of ...

github
больше 3 лет назад

Linux kernel 2.6.10 and 2.6.11rc1-bk6 uses different size types for offset arguments to the proc_file_read and locks_read_proc functions, which leads to a heap-based buffer overflow when a signed comparison causes negative integers to be used in a positive context.

EPSS

Процентиль: 25%
0.00084
Низкий

2.1 Low

CVSS2