Candidate: CVE-2005-2490 References: URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2490 Final-Decision: Interim-Decision: Modified: Proposed: Assigned: 20050808 Category: SF MISC:https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=166248 CONFIRM:http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.13.1 UBUNTU:USN-178-1 URL:http://www.ubuntu.com/usn/usn-178-1 BID:14785 URL:http://www.securityfocus.com/bid/14785 SECUNIA:16747 URL:http://secunia.com/advisories/16747/ XF:kernel-sendmsg-bo(22217) URL:http://xforce.iss.net/xforce/xfdb/22217 Description: Stack-based buffer overflow in the sendmsg function call in the Linux kernel 2.6 before 2.6.13.1 allows local users execute arbitrary code by calling sendmsg and modifying the message contents in another thread. upstream: released (2.6.13.1), released (2.4.33-pre1) linux-2.6: released (2.6.12-7, 2.6.13-1) [sendmsg-stackoverflow.patch, linux-2.6.13.1.patch] 2.6.8-sarge-security: released (2.6.8-16sarge2) [sendmsg-stackoverflow.dpatch] 2.4.27-sid/sarge: N/A 2.4.27-sarge-security: N/A 2.4.19-woody-security: 2.4.18-woody-security: 2.4.17-woody-security: 2.4.16-woody-security: 2.4.17-woody-security-hppa: 2.4.17-woody-security-ia64: 2.4.18-woody-security-hppa: