July 24, 2001

NetBSD: Insufficient checking sendmsg

Author: JT Smith

From Net-Security.org: "

Due to insufficient length checking in the kernel, sendmsg(2) can be used by a
local user to cause a kernel trap, or an 'out of space in kmem_map' panic.

As of the release date of this advisory, NetBSD releases from 1.3 up to any later
release, are vulnerable."


  • Linux
Click Here!