Buffer overflow in sysctl in the Linux Kernel 2.6 before 2.6.15 allows local users to corrupt user memory and possibly cause a denial of service via a long string, which causes sysctl to write a zero byte outside the buffer. NOTE: since the sysctl is called from a userland program that provides the argument, this might not be a vulnerability, unless a legitimate user-assisted or setuid scenario can be identified.
Advisories
Source ID Title
Debian DSA Debian DSA DSA-1017-1 New Linux kernel 2.6.8 packages fix several vulnerabilities
Debian DSA Debian DSA DSA-1018-1 New Linux kernel 2.4.27 packages fix several vulnerabilities
Debian DSA Debian DSA DSA-1018-2 New Linux kernel 2.4.27 packages fix several vulnerabilities
EUVD EUVD EUVD-2005-4613 Buffer overflow in sysctl in the Linux Kernel 2.6 before 2.6.15 allows local users to corrupt user memory and possibly cause a denial of service via a long string, which causes sysctl to write a zero byte outside the buffer. NOTE: since the sysctl is called from a userland program that provides the argument, this might not be a vulnerability, unless a legitimate user-assisted or setuid scenario can be identified.
Ubuntu USN Ubuntu USN USN-244-1 Linux kernel vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-07T23:53:27.796Z

Reserved: 2006-01-05T00:00:00

Link: CVE-2005-4618

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2005-12-31T05:00:00.000

Modified: 2025-04-03T01:03:51.193

Link: CVE-2005-4618

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses