The Linux kernel is susceptible to a local buffer-overflow vulnerability. This issue is due to the kernel's failure to properly bounds-check user-supplied input before using it in a memory copy operation. This issue allows local attackers to overwrite kernel memory with arbitrary data, potentially allowing them to execute malicious machine code in the context of affected kernels. This vulnerability facilitates the complete compromise of affected computers. This issue is only exploitable by local users who have superuser privileges, or have the CAP_NET_ADMIN capability. This issue is therefore only a security concern on computers running virtualization software that allows users to have superuser access to guest operating systems, or when the CAP_NET_ADMIN capability is given to untrusted users. Linux kernel versions prior to 2.6.16 in the 2.6 series are affected by this issue.
*** This bug has been marked as a duplicate of 127162 ***