[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#296900: CAN-2005-0529: Buffer overflow in proc_file_read



Package: kernel-source-2.6.8
Version: 2.6.8-13
Severity: critical
Tags: security
Justification: root security hole

Cite:
" Linux kernel 2.6.10 and 2.6.11rc1-bk6 uses different size types
for offset arguments to the proc_file_read and locks_read_proc
functions, which leads to a heap-based buffer overflow when a
signed comparison causes negative integers to be used in a positive
context."

The offending code is also in 2.6.8.

A fix is at:
http://linux.bkbits.net:8080/linux-2.6/cset@4201818eC6aMn0x3GY_9rw3ueb2ZWQ

The original advisory is at:
http://marc.theaimsgroup.com/?l=full-disclosure&m=110846727602817&w=2

The corresponding code in 2.4.27 lacks the bogus ssize_t cast. Therefore
2.4.27 should not be affected.

Please also fix 2.6.9 and 2.6.10.

-- System Information:
Debian Release: 3.1
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)



Reply to: