Linux Kernel Potential Buffer Overflow Vulnerabilities

Posted by tadelste on Nov 1, 2005 6:22 PM EDT
Secunia Advisories
Mail this story
Print this story

Two vulnerabilities have been reported in the Linux Kernel, with an unknown impact.

1) A boundary error due to missing parameter validation in the "map_to_seg7()" function in "drivers/usb/input/map_to_7segment.h" of the Yealink driver may cause out-of-bound memory references.

2) A boundary error in "/drivers/i2c/i2c-core.c" when handling SMBus Block Write transactions may cause a buffer overflow.

Solution:
The vulnerabilities have been fixed in version 2.6.14-git4.

Full Story

  Nav
» Read more about: Groups: Kernel; Story Type: News Story

« Return to the newswire homepage

This topic does not have any threads posted yet!

You cannot post until you login.