CVE-2005-3274

NameCVE-2005-3274
DescriptionRace condition in ip_vs_conn_flush in Linux 2.6 before 2.6.13 and 2.4 before 2.4.32-pre2, when running on SMP systems, allows local users to cause a denial of service (null dereference) by causing a connection timer to expire while the connection table is being flushed before the appropriate lock is acquired.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDSA-922-1

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
kernel-image-2.6.8-alphasourcesarge2.6.8-16sarge1DSA-922-1
kernel-image-2.6.8-amd64sourcesarge2.6.8-16sarge1DSA-922-1
kernel-image-2.6.8-hppasourcesarge2.6.8-6sarge1DSA-922-1
kernel-image-2.6.8-i386sourcesarge2.6.8-16sarge1DSA-922-1
kernel-image-2.6.8-ia64sourcesarge2.6.8-14sarge1DSA-922-1
kernel-image-2.6.8-m68ksourcesarge2.6.8-4sarge1DSA-922-1
kernel-image-2.6.8-s390sourcesarge2.6.8-5sarge1DSA-922-1
kernel-image-2.6.8-sparcsourcesarge2.6.8-15sarge1DSA-922-1
kernel-patch-powerpc-2.6.8sourcesarge2.6.8-12sarge1DSA-922-1
kernel-source-2.6.8sourcesarge2.6.8-16sarge1DSA-922-1
linux-2.6source(unstable)2.6.13-1low

Search for package or bug name: Reporting problems