Buffer overflow in sysctl in the Linux Kernel 2.6 before 2.6.15 allows
local users to corrupt user memory and possibly cause a denial of service
via a long string, which causes sysctl to write a zero byte outside the
buffer. NOTE: since the sysctl is called from a userland program that
provides the argument, this might not be a vulnerability, unless a
legitimate user-assisted or setuid scenario can be identified.
|Ubuntu 12.10 (Quantal Quetzal):||DNE
Updated: 2012-06-01 15:16:48 UTC (commit 5347)