2.1
CVSSv2

CVE-2005-3181

Published: 12/10/2005 Updated: 26/01/2024
CVSS v2 Base Score: 2.1 | Impact Score: 2.9 | Exploitability Score: 3.9
VMScore: 187
Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

The audit system in Linux kernel 2.6.6, and other versions prior to 2.6.13.4, when CONFIG_AUDITSYSCALL is enabled, uses an incorrect function to free names_cache memory, which prevents the memory from being tracked by AUDITSYSCALL code and leads to a memory leak that allows malicious users to cause a denial of service (memory consumption).

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel

canonical ubuntu linux 4.10

canonical ubuntu linux 5.04

debian debian linux 3.1

mandriva linux 10.1

mandriva linux 10.2

mandriva linux 2006.0

Vendor Advisories

Synopsis kernel security update Type/Severity Security Advisory: Important Topic Updated kernel packages that fix several security issues and a pageattribute mapping bug are now available for Red Hat Enterprise Linux 4 This update has been rated as having important security impact by theRed Hat Security Re ...
Several local and remote vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or the execution of arbitrary code The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2004-1017 Multiple overflows exist in the io_edgeport driver which might be usable as a denial of ...