Author: JT Smith
From Net-Security.org: ”
Due to insufficient length checking in the kernel, sendmsg(2) can be used by a
local user to cause a kernel trap, or an ‘out of space in kmem_map’ panic.
As of the release date of this advisory, NetBSD releases from 1.3 up to any later
release, are vulnerable.”
Category:
- Linux