Description
Stack-based buffer overflow in the sendmsg function call in the Linux kernel 2.6 before 2.6.13.1 allows local users to execute arbitrary code by calling sendmsg and modifying the message contents in another thread.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-1017-1 | New Linux kernel 2.6.8 packages fix several vulnerabilities |
EUVD |
EUVD-2005-2491 | Stack-based buffer overflow in the sendmsg function call in the Linux kernel 2.6 before 2.6.13.1 allows local users to execute arbitrary code by calling sendmsg and modifying the message contents in another thread. |
Ubuntu USN |
USN-178-1 | Linux kernel vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-07T22:30:01.525Z
Reserved: 2005-08-08T00:00:00.000Z
Link: CVE-2005-2490
No data.
Status : Deferred
Published: 2005-09-14T19:03:00.000
Modified: 2025-04-03T01:03:51.193
Link: CVE-2005-2490
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
EUVD
Ubuntu USN