Memory leak in the seq_file implementation in the SCSI procfs interface (sg.c) in Linux kernel 2.6.13 and earlier allows local users to cause a denial of service (memory consumption) via certain repeated reads from the /proc/scsi/sg/devices file, which is not properly handled when the next() iterator returns NULL or an error.
secunia.com/advisories/17826
secunia.com/advisories/17918
secunia.com/advisories/18510
secunia.com/advisories/19374
www.debian.org/security/2006/dsa-1017
www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=729d70f5dfd663b44bca68a4479c96bde7e535d6
www.mandriva.com/security/advisories?name=MDKSA-2005:218
www.mandriva.com/security/advisories?name=MDKSA-2005:219
www.mandriva.com/security/advisories?name=MDKSA-2005:220
www.redhat.com/support/errata/RHSA-2006-0101.html
www.securityfocus.com/archive/1/419522/100/0/threaded
www.securityfocus.com/archive/1/427980/100/0/threaded
www.securityfocus.com/bid/14790
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9954