Total vulnerabilities in the database
The audit system in Linux kernel 2.6.6, and other versions before 2.6.13.4, when CONFIG_AUDITSYSCALL is enabled, uses an incorrect function to free names_cache memory, which prevents the memory from being tracked by AUDITSYSCALL code and leads to a memory leak that allows attackers to cause a denial of service (memory consumption).
Software | From | Fixed in |
---|---|---|
linux / linux_kernel | 2.6.0 | 2.6.13.3.x |
canonical / ubuntu_linux | 4.10 | 4.10.x |
canonical / ubuntu_linux | 5.04 | 5.04.x |
debian / debian_linux | 3.1 | 3.1.x |
mandriva / linux | 10.1 | 10.1.x |
mandriva / linux | 10.2 | 10.2.x |
mandriva / linux | 2006.0 | 2006.0.x |