4.7
CVSSv3

CVE-2005-3274

Published: 21/10/2005 Updated: 21/01/2024
CVSS v2 Base Score: 1.2 | Impact Score: 2.9 | Exploitability Score: 1.9
CVSS v3 Base Score: 4.7 | Impact Score: 3.6 | Exploitability Score: 1
VMScore: 107
Vector: AV:L/AC:H/Au:N/C:N/I:N/A:P

Vulnerability Summary

Race condition in ip_vs_conn_flush in Linux 2.6 prior to 2.6.13 and 2.4 prior to 2.4.32-pre2, when running on SMP systems, allows local users to cause a denial of service (null dereference) by causing a connection timer to expire while the connection table is being flushed before the appropriate lock is acquired.

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel

debian debian linux 3.1

Vendor Advisories

The problem can be corrected by updating your system to the following package versions: ...
Synopsis Updated kernel packages available for Red Hat Enterprise Linux 4 Update 2 Type/Severity Security Advisory: Important Topic Updated kernel packages are now available as part of ongoing supportand maintenance of Red Hat Enterprise Linux version 4 This is thesecond regular updateThis update has bee ...
Synopsis Updated kernel packages available for Red Hat Enterprise Linux 3 Update 6 Type/Severity Security Advisory: Important Topic Updated kernel packages are now available as part of ongoing support andmaintenance of Red Hat Enterprise Linux version 3 This is the sixthregular updateThis security adviso ...
Several local and remote vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or the execution of arbitrary code The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2004-2302 A race condition in the sysfs filesystem allows local users to read kernel memory and ca ...