summaryrefslogtreecommitdiffstats
path: root/retired/CVE-2005-2490
blob: d06ca17244232d05517f6ae86bfa6a32cbc099aa (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
Candidate: CVE-2005-2490
References: 
 URL: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2490
 Final-Decision:
 Interim-Decision:
 Modified:
 Proposed:
 Assigned: 20050808
 Category: SF
 MISC:https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=166248
 CONFIRM:http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.13.1
 UBUNTU:USN-178-1
 URL:http://www.ubuntu.com/usn/usn-178-1
 BID:14785
 URL:http://www.securityfocus.com/bid/14785
 SECUNIA:16747
 URL:http://secunia.com/advisories/16747/
 XF:kernel-sendmsg-bo(22217)
 URL:http://xforce.iss.net/xforce/xfdb/22217
Description: 
 Stack-based buffer overflow in the sendmsg function call in the Linux
 kernel 2.6 before 2.6.13.1 allows local users execute arbitrary code
 by calling sendmsg and modifying the message contents in another
 thread.
upstream: released (2.6.13.1), released (2.4.33-pre1)
linux-2.6: released (2.6.12-7, 2.6.13-1) [sendmsg-stackoverflow.patch, linux-2.6.13.1.patch]
2.6.8-sarge-security: released (2.6.8-16sarge2) [sendmsg-stackoverflow.dpatch]
2.4.27-sid/sarge: N/A
2.4.27-sarge-security: N/A
2.4.19-woody-security: 
2.4.18-woody-security: 
2.4.17-woody-security: 
2.4.16-woody-security: 
2.4.17-woody-security-hppa: 
2.4.17-woody-security-ia64: 
2.4.18-woody-security-hppa: 

© 2014-2024 Faster IT GmbH | imprint | privacy policy