{
  "threat_severity" : "Important",
  "public_date" : "2005-09-08T00:00:00Z",
  "bugzilla" : {
    "description" : "security flaw",
    "id" : "1617724",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1617724"
  },
  "details" : [ "Stack-based buffer overflow in the sendmsg function call in the Linux kernel 2.6 before 2.6.13.1 allows local users to execute arbitrary code by calling sendmsg and modifying the message contents in another thread." ],
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 3",
    "release_date" : "2005-09-28T00:00:00Z",
    "advisory" : "RHSA-2005:663",
    "cpe" : "cpe:/o:redhat:enterprise_linux:3",
    "package" : "kernel-0:2.4.21-37.EL"
  }, {
    "product_name" : "Red Hat Enterprise Linux 4",
    "release_date" : "2005-10-05T00:00:00Z",
    "advisory" : "RHSA-2005:514",
    "cpe" : "cpe:/o:redhat:enterprise_linux:4",
    "package" : "kernel-0:2.6.9-22.EL"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2005-2490\nhttps://nvd.nist.gov/vuln/detail/CVE-2005-2490" ],
  "name" : "CVE-2005-2490",
  "csaw" : false
}