CVE-2005-3274
low-risk
Published 2005-10-21
Race condition in ip_vs_conn_flush in Linux 2.6 before 2.6.13 and 2.4 before 2.4.32-pre2, when running on SMP systems, allows local users to cause a denial of service (null dereference) by causing a connection timer to expire while the connection table is being flushed before the appropriate lock is acquired.
Do I need to act?
-
0.09% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
4
CVSS 4.7/10
Medium
LOCAL
/ HIGH complexity
Affected Products (2)
References (40)
Mailing List
http://lkml.org/lkml/2005/6/23/249
Mailing List
http://lkml.org/lkml/2005/6/24/173
Broken Link
http://secunia.com/advisories/17826
Broken Link
http://secunia.com/advisories/18056
Broken Link
http://secunia.com/advisories/18684
Broken Link
http://secunia.com/advisories/18977
Third Party Advisory
http://www.debian.org/security/2005/dsa-922
Broken Link
http://www.securityfocus.com/bid/15528
Broken Link
https://usn.ubuntu.com/219-1/
and 20 more references
19
/ 100
low-risk
Severity
12/34 · Low
Exploitability
0/34 · Minimal
Exposure
7/34 · Low