Stack-based buffer overflow in the sendmsg function call in the Linux kernel 2.6 before 2.6.13.1 allows local users to execute arbitrary code by calling sendmsg and modifying the message contents in another thread.
Get an AI-powered plain-language explanation of this vulnerability and remediation steps.
Login to generate AI explanation48 reference(s) from NVD