Stack-based buffer overflow in the sendmsg function call in the Linux kernel 2.6 before 2.6.13.1 allows local users to execute arbitrary code by calling sendmsg and modifying the message contents in another thread.
Metrics
Affected Vendors & Products
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-07T22:30:01.525Z
Reserved: 2005-08-08T00:00:00
Link: CVE-2005-2490

No data.

Status : Deferred
Published: 2005-09-14T19:03:00.000
Modified: 2025-04-03T01:03:51.193
Link: CVE-2005-2490


No data.