The audit system in Linux kernel 2.6.6, and other versions before 2.6.13.4, when CONFIG_AUDITSYSCALL is enabled, uses an incorrect function to free names_cache memory, which prevents the memory from being tracked by AUDITSYSCALL code and leads to a memory leak that allows attackers to cause a denial of service (memory consumption).
| Software | From | Fixed in |
|---|---|---|
| linux / linux_kernel | 2.6.0 | 2.6.13.3.x |
| canonical / ubuntu_linux | 4.10 | 4.10.x |
| canonical / ubuntu_linux | 5.04 | 5.04.x |
| debian / debian_linux | 3.1 | 3.1.x |
| mandriva / linux | 10.1 | 10.1.x |
| mandriva / linux | 10.2 | 10.2.x |
| mandriva / linux | 2006.0 | 2006.0.x |