CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:L/AC:L/Au:N/C:N/I:N/A:P
AI Score
Confidence
High
EPSS
Percentile
23.1%
Memory leak in the seq_file implementation in the SCSI procfs interface (sg.c) in Linux kernel 2.6.13 and earlier allows local users to cause a denial of service (memory consumption) via certain repeated reads from the /proc/scsi/sg/devices file, which is not properly handled when the next() iterator returns NULL or an error.
Vendor | Product | Version | CPE |
---|---|---|---|
linux | linux_kernel | 2.6.0 | cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:* |
linux | linux_kernel | 2.6.1 | cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:* |
linux | linux_kernel | 2.6.2 | cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:* |
linux | linux_kernel | 2.6.3 | cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:* |
linux | linux_kernel | 2.6.4 | cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:* |
linux | linux_kernel | 2.6.5 | cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:* |
linux | linux_kernel | 2.6.6 | cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:* |
linux | linux_kernel | 2.6.7 | cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:* |
linux | linux_kernel | 2.6.8 | cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:* |
linux | linux_kernel | 2.6.9 | cpe:2.3:o:linux:linux_kernel:2.6.9:2.6.20:*:*:*:*:*:* |
secunia.com/advisories/17826
secunia.com/advisories/17918
secunia.com/advisories/18510
secunia.com/advisories/19374
www.debian.org/security/2006/dsa-1017
www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=729d70f5dfd663b44bca68a4479c96bde7e535d6
www.mandriva.com/security/advisories?name=MDKSA-2005:218
www.mandriva.com/security/advisories?name=MDKSA-2005:219
www.mandriva.com/security/advisories?name=MDKSA-2005:220
www.redhat.com/support/errata/RHSA-2006-0101.html
www.securityfocus.com/archive/1/419522/100/0/threaded
www.securityfocus.com/archive/1/427980/100/0/threaded
www.securityfocus.com/bid/14790
oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9954