VYPR
Unrated severityNVD Advisory· Published Oct 12, 2005· Updated Apr 16, 2026

CVE-2005-3181

CVE-2005-3181

Description

The audit system in Linux kernel 2.6.6, and other versions before 2.6.13.4, when CONFIG_AUDITSYSCALL is enabled, uses an incorrect function to free names_cache memory, which prevents the memory from being tracked by AUDITSYSCALL code and leads to a memory leak that allows attackers to cause a denial of service (memory consumption).

Affected products

7
  • cpe:2.3:o:canonical:ubuntu_linux:4.10:*:*:*:*:*:*:*+ 1 more
    • cpe:2.3:o:canonical:ubuntu_linux:4.10:*:*:*:*:*:*:*
    • cpe:2.3:o:canonical:ubuntu_linux:5.04:*:*:*:*:*:*:*
  • cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*
  • cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
    Range: >=2.6.0,<=2.6.13.3
  • Mandriva/Linux3 versions
    cpe:2.3:o:mandriva:linux:10.1:*:*:*:*:*:*:*+ 2 more
    • cpe:2.3:o:mandriva:linux:10.1:*:*:*:*:*:*:*
    • cpe:2.3:o:mandriva:linux:10.2:*:*:*:*:*:*:*
    • cpe:2.3:o:mandriva:linux:2006.0:*:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

20

News mentions

0

No linked articles in our index yet.