First published: Thu Feb 24 2005(Updated: )
Signedness error in the copy_from_read_buf function in n_tty.c for Linux kernel 2.6.10 and 2.6.11rc1 allows local users to read kernel memory via a negative argument.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux kernel | =2.6.11_rc1_bk6 | |
Linux kernel | =2.6.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-0530 is considered to be of medium severity as it allows local users to read kernel memory, potentially exposing sensitive information.
To fix CVE-2005-0530, upgrade the Linux kernel to a version later than 2.6.11rc1 or 2.6.10 that includes patches addressing this vulnerability.
CVE-2005-0530 affects Linux kernel versions 2.6.10 and 2.6.11rc1.
Local users on systems running the affected versions of the Linux kernel are at risk from CVE-2005-0530.
An attacker can exploit CVE-2005-0530 to read sensitive kernel memory by providing a negative argument to the copy_from_read_buf function.