2.1 Low
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:L/AC:L/Au:N/C:N/I:N/A:P
5.1 Medium
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
31.5%
The audit system in Linux kernel 2.6.6, and other versions before 2.6.13.4, when CONFIG_AUDITSYSCALL is enabled, uses an incorrect function to free names_cache memory, which prevents the memory from being tracked by AUDITSYSCALL code and leads to a memory leak that allows attackers to cause a denial of service (memory consumption).
CPE | Name | Operator | Version |
---|---|---|---|
linux:linux_kernel | linux linux kernel | le | 2.6.13.3 |
kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=829841146878e082613a49581ae252c071057c23
linux.bkbits.net:8080/linux-2.6/cset%404346883bQBeBd26syWTKX2CVC5bDcA
secunia.com/advisories/17114
secunia.com/advisories/17280
secunia.com/advisories/17364
secunia.com/advisories/17826
secunia.com/advisories/17917
secunia.com/advisories/19374
www.debian.org/security/2006/dsa-1017
www.mandriva.com/security/advisories?name=MDKSA-2005:218
www.mandriva.com/security/advisories?name=MDKSA-2005:219
www.mandriva.com/security/advisories?name=MDKSA-2005:220
www.mandriva.com/security/advisories?name=MDKSA-2005:235
www.redhat.com/support/errata/RHSA-2005-808.html
www.securityfocus.com/advisories/9549
www.securityfocus.com/advisories/9806
www.securityfocus.com/archive/1/427980/100/0/threaded
www.securityfocus.com/bid/15076
www.ubuntu.com/usn/usn-199-1
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9467