Bug#296900: CAN-2005-0529: Buffer overflow in proc_file_read

2005-02-25 Thread Stefan Fritsch
Package: kernel-source-2.6.8 Version: 2.6.8-13 Severity: critical Tags: security Justification: root security hole Cite: Linux kernel 2.6.10 and 2.6.11rc1-bk6 uses different size types for offset arguments to the proc_file_read and locks_read_proc functions, which leads to a heap-based buffer

Bug#296901: CAN-2005-0530: information disclosure because of signedness error in copy_from_read_buf

2005-02-25 Thread Stefan Fritsch
Package: kernel-source-2.6.8 Version: 2.6.8-13 Severity: grave Tags: security Justification: user security hole Signedness error in the copy_from_read_buf function in n_tty.c for Linux kernel 2.6.10 and 2.6.11rc1 allows local users to read kernel memory via a negative argument. The offending

<    1   2   3   4   5