blob: d06ca17244232d05517f6ae86bfa6a32cbc099aa (
plain) (
blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
|
Candidate: CVE-2005-2490
References:
URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2490
Final-Decision:
Interim-Decision:
Modified:
Proposed:
Assigned: 20050808
Category: SF
MISC:https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=166248
CONFIRM:http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.13.1
UBUNTU:USN-178-1
URL:http://www.ubuntu.com/usn/usn-178-1
BID:14785
URL:http://www.securityfocus.com/bid/14785
SECUNIA:16747
URL:http://secunia.com/advisories/16747/
XF:kernel-sendmsg-bo(22217)
URL:http://xforce.iss.net/xforce/xfdb/22217
Description:
Stack-based buffer overflow in the sendmsg function call in the Linux
kernel 2.6 before 2.6.13.1 allows local users execute arbitrary code
by calling sendmsg and modifying the message contents in another
thread.
upstream: released (2.6.13.1), released (2.4.33-pre1)
linux-2.6: released (2.6.12-7, 2.6.13-1) [sendmsg-stackoverflow.patch, linux-2.6.13.1.patch]
2.6.8-sarge-security: released (2.6.8-16sarge2) [sendmsg-stackoverflow.dpatch]
2.4.27-sid/sarge: N/A
2.4.27-sarge-security: N/A
2.4.19-woody-security:
2.4.18-woody-security:
2.4.17-woody-security:
2.4.16-woody-security:
2.4.17-woody-security-hppa:
2.4.17-woody-security-ia64:
2.4.18-woody-security-hppa:
|