Bug#296900: CAN-2005-0529: Buffer overflow in proc_file_read
Package: kernel-source-2.6.8
Version: 2.6.8-13
Severity: critical
Tags: security
Justification: root security hole
Cite:
" Linux kernel 2.6.10 and 2.6.11rc1-bk6 uses different size types
for offset arguments to the proc_file_read and locks_read_proc
functions, which leads to a heap-based buffer overflow when a
signed comparison causes negative integers to be used in a positive
context."
The offending code is also in 2.6.8.
A fix is at:
http://linux.bkbits.net:8080/linux-2.6/cset@4201818eC6aMn0x3GY_9rw3ueb2ZWQ
The original advisory is at:
http://marc.theaimsgroup.com/?l=full-disclosure&m=110846727602817&w=2
The corresponding code in 2.4.27 lacks the bogus ssize_t cast. Therefore
2.4.27 should not be affected.
Please also fix 2.6.9 and 2.6.10.
-- System Information:
Debian Release: 3.1
APT prefers unstable
APT policy: (500, 'unstable')
Architecture: i386 (i686)
Reply to: