Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2005-3119

Опубликовано: 12 окт. 2005
Источник: debian
EPSS Низкий

Описание

Memory leak in the request_key_auth_destroy function in request_key_auth in Linux kernel 2.6.10 up to 2.6.13 allows local users to cause a denial of service (memory consumption) via a large number of authorization token keys.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linux-2.6fixed2.6.13-2package
kernel-source-2.4.27not-affectedpackage

Примечания

  • 2.6.12 itself not affected, fixed in SVN

EPSS

Процентиль: 31%
0.00114
Низкий

Связанные уязвимости

ubuntu
почти 20 лет назад

Memory leak in the request_key_auth_destroy function in request_key_auth in Linux kernel 2.6.10 up to 2.6.13 allows local users to cause a denial of service (memory consumption) via a large number of authorization token keys.

redhat
почти 20 лет назад

Memory leak in the request_key_auth_destroy function in request_key_auth in Linux kernel 2.6.10 up to 2.6.13 allows local users to cause a denial of service (memory consumption) via a large number of authorization token keys.

nvd
почти 20 лет назад

Memory leak in the request_key_auth_destroy function in request_key_auth in Linux kernel 2.6.10 up to 2.6.13 allows local users to cause a denial of service (memory consumption) via a large number of authorization token keys.

github
больше 3 лет назад

Memory leak in the request_key_auth_destroy function in request_key_auth in Linux kernel 2.6.10 up to 2.6.13 allows local users to cause a denial of service (memory consumption) via a large number of authorization token keys.

EPSS

Процентиль: 31%
0.00114
Низкий