Missing release of memory after effective lifetime in Linux kernel - CVE-2005-3181
Published: October 12, 2005 / Updated: January 26, 2024
Linux kernel
Detailed vulnerability description
The vulnerability allows a local user to perform service disruption.
The audit system in Linux kernel 2.6.6, and other versions before 2.6.13.4, when CONFIG_AUDITSYSCALL is enabled, uses an incorrect function to free names_cache memory, which prevents the memory from being tracked by AUDITSYSCALL code and leads to a memory leak that allows attackers to cause a denial of service (memory consumption).
How to mitigate CVE-2005-3181
Sources
- http://www.securityfocus.com/advisories/9549
- http://www.ubuntu.com/usn/usn-199-1
- http://www.redhat.com/support/errata/RHSA-2005-808.html
- http://secunia.com/advisories/17364
- http://www.securityfocus.com/advisories/9806
- http://secunia.com/advisories/17917
- http://www.securityfocus.com/bid/15076
- http://www.debian.org/security/2006/dsa-1017
- http://secunia.com/advisories/17114
- http://secunia.com/advisories/17280
- http://secunia.com/advisories/17826
- http://secunia.com/advisories/19374
- http://www.mandriva.com/security/advisories?name=MDKSA-2005:218
- http://www.mandriva.com/security/advisories?name=MDKSA-2005:235
- http://www.mandriva.com/security/advisories?name=MDKSA-2005:220
- http://www.mandriva.com/security/advisories?name=MDKSA-2005:219
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9467
- http://www.securityfocus.com/archive/1/427980/100/0/threaded
- http://kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=829841146878e082613a49581ae252c071057c23
- http://linux.bkbits.net:8080/linux-2.6/cset%404346883bQBeBd26syWTKX2CVC5bDcA