First published: Wed Sep 14 2005(Updated: )
Stack-based buffer overflow in the sendmsg function call in the Linux kernel 2.6 before 2.6.13.1 allows local users to execute arbitrary code by calling sendmsg and modifying the message contents in another thread.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | =2.6.11-rc3 | |
Linux Linux kernel | =2.6.11 | |
Linux Linux kernel | =2.6.12-rc1 | |
Linux Linux kernel | =2.6.12-rc4 | |
Linux Linux kernel | =2.6.5 | |
Linux Linux kernel | =2.6.1 | |
Linux Linux kernel | =2.6.11.8 | |
Linux Linux kernel | =2.6.10 | |
Linux Linux kernel | =2.6.11.6 | |
Linux Linux kernel | =2.6.11.11 | |
Linux Linux kernel | =2.6.0-test5 | |
Linux Linux kernel | =2.6.3 | |
Linux Linux kernel | =2.6.0-test2 | |
Linux Linux kernel | =2.6.4 | |
Linux Linux kernel | =2.6_test9_cvs | |
Linux Linux kernel | =2.6.11.5 | |
Linux Linux kernel | =2.6.7-rc1 | |
Linux Linux kernel | =2.6.2 | |
Linux Linux kernel | =2.6.8-rc1 | |
Linux Linux kernel | =2.6.0-test11 | |
Linux Linux kernel | =2.6.1-rc2 | |
Linux Linux kernel | =2.6.11-rc4 | |
Linux Linux kernel | =2.6.8 | |
Linux Linux kernel | =2.6.0-test1 | |
Linux Linux kernel | =2.6.0-test6 | |
Linux Linux kernel | =2.6.10-rc2 | |
Linux Linux kernel | =2.6.0-test4 | |
Linux Linux kernel | =2.6.0 | |
Linux Linux kernel | =2.6.0-test10 | |
Linux Linux kernel | =2.6.0-test9 | |
Linux Linux kernel | =2.6.7 | |
Linux Linux kernel | =2.6.11-rc2 | |
Linux Linux kernel | =2.6.1-rc1 | |
Linux Linux kernel | =2.6.6-rc1 | |
Linux Linux kernel | =2.6.9-2.6.20 | |
Linux Linux kernel | =2.6.11.7 | |
Linux Linux kernel | =2.6.0-test7 | |
Linux Linux kernel | =2.6.8-rc2 | |
Linux Linux kernel | =2.6.8-rc3 | |
Linux Linux kernel | =2.6.0-test8 | |
Linux Linux kernel | =2.6.6 | |
Linux Linux kernel | =2.6.0-test3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.