Stack-based buffer overflow in the sendmsg function call in the Linux kernel 2.6 before 2.6.13.1 allows local users to execute arbitrary code by calling sendmsg and modifying the message contents in another thread.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-1017-1 | New Linux kernel 2.6.8 packages fix several vulnerabilities |
EUVD |
EUVD-2005-2491 | Stack-based buffer overflow in the sendmsg function call in the Linux kernel 2.6 before 2.6.13.1 allows local users to execute arbitrary code by calling sendmsg and modifying the message contents in another thread. |
Ubuntu USN |
USN-178-1 | Linux kernel vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-07T22:30:01.525Z
Reserved: 2005-08-08T00:00:00
Link: CVE-2005-2490
No data.
Status : Deferred
Published: 2005-09-14T19:03:00.000
Modified: 2025-04-03T01:03:51.193
Link: CVE-2005-2490
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
EUVD
Ubuntu USN