Upstream information

CVE-2005-0530 at MITRE

Description

Signedness error in the copy_from_read_buf function in n_tty.c for Linux kernel 2.6.10 and 2.6.11rc1 allows local users to read kernel memory via a negative argument.

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having low severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 2.1
Vector AV:L/AC:L/Au:N/C:P/I:N/A:N
Access Vector Local
Access Complexity Low
Authentication None
Confidentiality Impact Partial
Integrity Impact None
Availability Impact None
SUSE Bugzilla entry: 65318 [RESOLVED]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
Open Enterprise Server
  • drbd >= 0.7.5-0.16
  • km_drbd >= 0.7.5-0.16
suse91.s390x
suse91.ia64
suse91.s390
suse91.x86-64
suse91.ppc
suse91.x86
YOU Patch Nr: 9975
Novell Linux Desktop 9 for x86_64
  • kernel-default >= 2.6.5-7.151
  • kernel-smp >= 2.6.5-7.151
  • kernel-source >= 2.6.5-7.151
  • kernel-syms >= 2.6.5-7.151
suse91.x86-64
YOU Patch Nr: 9962
Novell Linux Desktop 9 for x86
  • kernel-bigsmp >= 2.6.5-7.151
  • kernel-default >= 2.6.5-7.151
  • kernel-smp >= 2.6.5-7.151
  • kernel-source >= 2.6.5-7.151
  • kernel-syms >= 2.6.5-7.151
suse91.x86
YOU Patch Nr: 9965
Open Enterprise Server
  • kernel-bigsmp >= 2.6.5-7.151
  • kernel-debug >= 2.6.5-7.151
  • kernel-default >= 2.6.5-7.151
  • kernel-smp >= 2.6.5-7.151
  • kernel-source >= 2.6.5-7.151
  • kernel-syms >= 2.6.5-7.151
  • kernel-um >= 2.6.5-7.151
  • um-host-install-initrd >= 1.0-48.6
  • um-host-kernel >= 2.6.5-7.151
suse91.x86
YOU Patch Nr: 9965