Skip to content

Race condition in ip_vs_conn_flush in Linux 2.6 before 2...

Low severity Unreviewed Published May 1, 2022 to the GitHub Advisory Database • Updated Jan 21, 2024

Package

No package listedSuggest a package

Affected versions

Unknown

Patched versions

Unknown

Description

Race condition in ip_vs_conn_flush in Linux 2.6 before 2.6.13 and 2.4 before 2.4.32-pre2, when running on SMP systems, allows local users to cause a denial of service (null dereference) by causing a connection timer to expire while the connection table is being flushed before the appropriate lock is acquired.

References

Published by the National Vulnerability Database Oct 21, 2005
Published to the GitHub Advisory Database May 1, 2022
Last updated Jan 21, 2024

Severity

Low

EPSS score

1.251%
(86th percentile)

Weaknesses

CVE ID

CVE-2005-3274

GHSA ID

GHSA-53p3-f48x-w9j5

Source code

No known source code

Dependabot alerts are not supported on this advisory because it does not have a package from a supported ecosystem with an affected and fixed version.

Learn more about GitHub language support

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.