CVE-2005-3274
Gravedad CVSS v3.1:
MEDIA
Tipo:
CWE-476
Desreferencia a puntero nulo (NULL)
Fecha de publicación:
21/10/2005
Última modificación:
03/04/2025
Descripción
*** Pendiente de traducción *** Race condition in ip_vs_conn_flush in Linux 2.6 before 2.6.13 and 2.4 before 2.4.32-pre2, when running on SMP systems, allows local users to cause a denial of service (null dereference) by causing a connection timer to expire while the connection table is being flushed before the appropriate lock is acquired.
Impacto
Puntuación base 3.x
4.70
Gravedad 3.x
MEDIA
Puntuación base 2.0
1.20
Gravedad 2.0
BAJA
Productos y versiones vulnerables
CPE | Desde | Hasta |
---|---|---|
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 2.4.0 (incluyendo) | 2.4.31 (incluyendo) |
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 2.6.0 (incluyendo) | 2.6.13 (excluyendo) |
cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- http://lkml.org/lkml/2005/6/23/249
- http://lkml.org/lkml/2005/6/24/173
- http://secunia.com/advisories/17826
- http://secunia.com/advisories/18056
- http://secunia.com/advisories/18684
- http://secunia.com/advisories/18977
- http://www.debian.org/security/2005/dsa-922
- http://www.kernel.org/git/?p=linux/kernel/git/marcelo/linux-2.4.git%3Ba%3Dcommit%3Bh%3De684f066dff5628bb61ad1912de6e8058b5b4c7d
- http://www.mandriva.com/security/advisories?name=MDKSA-2005%3A218
- http://www.mandriva.com/security/advisories?name=MDKSA-2005%3A219
- http://www.mandriva.com/security/advisories?name=MDKSA-2005%3A220
- http://www.mandriva.com/security/advisories?name=MDKSA-2005%3A235
- http://www.redhat.com/support/errata/RHSA-2005-663.html
- http://www.redhat.com/support/errata/RHSA-2006-0190.html
- http://www.securityfocus.com/archive/1/427980/100/0/threaded
- http://www.securityfocus.com/archive/1/427981/100/0/threaded
- http://www.securityfocus.com/bid/15528
- http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006%3A044
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11723
- https://usn.ubuntu.com/219-1/
- http://lkml.org/lkml/2005/6/23/249
- http://lkml.org/lkml/2005/6/24/173
- http://secunia.com/advisories/17826
- http://secunia.com/advisories/18056
- http://secunia.com/advisories/18684
- http://secunia.com/advisories/18977
- http://www.debian.org/security/2005/dsa-922
- http://www.kernel.org/git/?p=linux/kernel/git/marcelo/linux-2.4.git%3Ba%3Dcommit%3Bh%3De684f066dff5628bb61ad1912de6e8058b5b4c7d
- http://www.mandriva.com/security/advisories?name=MDKSA-2005%3A218
- http://www.mandriva.com/security/advisories?name=MDKSA-2005%3A219
- http://www.mandriva.com/security/advisories?name=MDKSA-2005%3A220
- http://www.mandriva.com/security/advisories?name=MDKSA-2005%3A235
- http://www.redhat.com/support/errata/RHSA-2005-663.html
- http://www.redhat.com/support/errata/RHSA-2006-0190.html
- http://www.securityfocus.com/archive/1/427980/100/0/threaded
- http://www.securityfocus.com/archive/1/427981/100/0/threaded
- http://www.securityfocus.com/bid/15528
- http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006%3A044
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11723
- https://usn.ubuntu.com/219-1/