SB2005101201 - Missing release of memory after effective lifetime in Linux kernel
Published: October 12, 2005
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Missing release of memory after effective lifetime (CVE-ID: CVE-2005-3181)
The vulnerability allows a local user to perform service disruption.
The audit system in Linux kernel 2.6.6, and other versions before 2.6.13.4, when CONFIG_AUDITSYSCALL is enabled, uses an incorrect function to free names_cache memory, which prevents the memory from being tracked by AUDITSYSCALL code and leads to a memory leak that allows attackers to cause a denial of service (memory consumption).
Remediation
Install update from vendor's website.
References
- http://www.securityfocus.com/advisories/9549
- http://www.ubuntu.com/usn/usn-199-1
- http://www.redhat.com/support/errata/RHSA-2005-808.html
- http://secunia.com/advisories/17364
- http://www.securityfocus.com/advisories/9806
- http://secunia.com/advisories/17917
- http://www.securityfocus.com/bid/15076
- http://www.debian.org/security/2006/dsa-1017
- http://secunia.com/advisories/17114
- http://secunia.com/advisories/17280
- http://secunia.com/advisories/17826
- http://secunia.com/advisories/19374
- http://www.mandriva.com/security/advisories?name=MDKSA-2005:218
- http://www.mandriva.com/security/advisories?name=MDKSA-2005:235
- http://www.mandriva.com/security/advisories?name=MDKSA-2005:220
- http://www.mandriva.com/security/advisories?name=MDKSA-2005:219
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9467
- http://www.securityfocus.com/archive/1/427980/100/0/threaded
- http://kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=829841146878e082613a49581ae252c071057c23
- http://linux.bkbits.net:8080/linux-2.6/cset%404346883bQBeBd26syWTKX2CVC5bDcA