Description
Memory leak in the seq_file implementation in the SCSI procfs interface (sg.c) in Linux kernel 2.6.13 and earlier allows local users to cause a denial of service (memory consumption) via certain repeated reads from the /proc/scsi/sg/devices file, which is not properly handled when the next() iterator returns NULL or an error.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by anonymous · bashdoslinux
https://www.exploit-db.com/exploits/26248
References (14)
Core 14
Core References
Vendor Advisory x_refsource_confirm
http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=729d70f5dfd663b44bca68a4479c96bde7e535d6
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/14790
Vendor Advisory vendor-advisory
x_refsource_mandrake
http://www.mandriva.com/security/advisories?name=MDKSA-2005:220
Not Applicable vendor-advisory
x_refsource_redhat
http://www.redhat.com/support/errata/RHSA-2006-0101.html
Third Party Advisory, VDB Entry vendor-advisory
x_refsource_suse
http://www.securityfocus.com/archive/1/419522/100/0/threaded
Third Party Advisory, VDB Entry vdb-entry
signature
x_refsource_oval
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9954
Permissions Required, Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/18510
Broken Link vendor-advisory
x_refsource_mandrake
http://www.mandriva.com/security/advisories?name=MDKSA-2005:218
Permissions Required, Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/17826
Permissions Required, Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/17918
Third Party Advisory, VDB Entry vendor-advisory
x_refsource_fedora
http://www.securityfocus.com/archive/1/427980/100/0/threaded
Third Party Advisory vendor-advisory
x_refsource_debian
http://www.debian.org/security/2006/dsa-1017
Vendor Advisory vendor-advisory
x_refsource_mandrake
http://www.mandriva.com/security/advisories?name=MDKSA-2005:219
Permissions Required, Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/19374
Scores
EPSS
0.0021
EPSS Percentile
42.8%
Details
CWE
CWE-399
Status
published
Products (14)
linux/linux_kernel
2.6.0
linux/linux_kernel
2.6.1
linux/linux_kernel
2.6.2
linux/linux_kernel
2.6.3
linux/linux_kernel
2.6.4
linux/linux_kernel
2.6.5
linux/linux_kernel
2.6.6
linux/linux_kernel
2.6.7
linux/linux_kernel
2.6.8
linux/linux_kernel
2.6.9 2.6.20
... and 4 more
Published
Sep 06, 2005
Tracked Since
Feb 18, 2026