First published: Thu Feb 24 2005(Updated: )
The atm_get_addr function in addr.c for Linux kernel 2.6.10 and 2.6.11 before 2.6.11-rc4 may allow local users to trigger a buffer overflow via negative arguments.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux kernel | =2.6.11-rc3 | |
Linux kernel | =2.6.11 | |
Linux kernel | =2.6.10 | |
Linux kernel | =2.6.11-rc1 | |
Linux kernel | =2.6.11-rc2 | |
Linux Kernel | =2.6.10 | |
Linux Kernel | =2.6.11 | |
Linux Kernel | =2.6.11-rc1 | |
Linux Kernel | =2.6.11-rc2 | |
Linux Kernel | =2.6.11-rc3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-0531 is classified as a high-severity vulnerability due to its potential for local users to exploit a buffer overflow.
To fix CVE-2005-0531, update the Linux kernel to version 2.6.11-rc4 or later.
CVE-2005-0531 affects Linux kernel versions 2.6.10 and 2.6.11 up to 2.6.11-rc3.
CVE-2005-0531 is a buffer overflow vulnerability that can be triggered by negative arguments.
CVE-2005-0531 can be exploited by local users with access to the affected system.