Off-by-one vulnerability in CPIA driver of Linux kernel before 2.2.19 allows users to modify kernel memory.
A product calculates or uses an incorrect maximum or minimum value that is 1 more, or 1 less, than the correct value.
Link | Tags |
---|---|
http://www.redhat.com/support/errata/RHSA-2001-047.html | vendor advisory broken link |
http://marc.info/?l=bugtraq&m=98637996127004&w=2 | mailing list patch vendor advisory |
http://www.linux.org.uk/VERSION/relnotes.2219.html | broken link |
https://www.debian.org/security/2001/dsa-047 | vendor advisory broken link |
http://marc.info/?l=bugtraq&m=98759029811377&w=2 | mailing list vendor advisory |
http://marc.info/?l=bugtraq&m=98684172109474&w=2 | mailing list patch |
http://marc.info/?l=bugtraq&m=98575345009963&w=2 | mailing list patch vendor advisory |
http://marc.info/?l=bugtraq&m=98775114228203&w=2 | mailing list patch vendor advisory |
http://marc.info/?l=bugtraq&m=98653252326445&w=2 | mailing list |
http://marc.info/?l=bugtraq&m=99013830726309&w=2 | mailing list vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/11162 | vdb entry third party advisory |