Description
Signedness error in the copy_from_read_buf function in n_tty.c for Linux kernel 2.6.10 and 2.6.11rc1 allows local users to read kernel memory via a negative argument.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2005-0531 | Signedness error in the copy_from_read_buf function in n_tty.c for Linux kernel 2.6.10 and 2.6.11rc1 allows local users to read kernel memory via a negative argument. |
Ubuntu USN |
USN-95-1 | Linux kernel vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-07T21:13:54.505Z
Reserved: 2005-02-24T00:00:00.000Z
Link: CVE-2005-0530
No data.
Status : Modified
Published: 2005-05-02T04:00:00.000
Modified: 2026-04-16T00:27:16.627
Link: CVE-2005-0530
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Ubuntu USN