{"api_version":"1","generated_at":"2026-04-23T04:33:27+00:00","cve":"CVE-2005-3181","urls":{"html":"https://cve.report/CVE-2005-3181","api":"https://cve.report/api/cve/CVE-2005-3181.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2005-3181","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2005-3181"},"summary":{"title":"CVE-2005-3181","description":"The audit system in Linux kernel 2.6.6, and other versions before 2.6.13.4, when CONFIG_AUDITSYSCALL is enabled, uses an incorrect function to free names_cache memory, which prevents the memory from being tracked by AUDITSYSCALL code and leads to a memory leak that allows attackers to cause a denial of service (memory consumption).","state":"PUBLISHED","assigner":"redhat","published_at":"2005-10-12 13:04:00","updated_at":"2025-04-03 01:03:51"},"problem_types":["CWE-401","n/a"],"metrics":[{"version":"2.0","source":"nvd@nist.gov","type":"Primary","score":"2.1","severity":"","vector":"AV:L/AC:L/Au:N/C:N/I:N/A:P","data":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:N/A:P","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"}}],"references":[{"url":"http://secunia.com/advisories/19374","name":"http://secunia.com/advisories/19374","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link","Vendor Advisory"],"title":"Debian update for kernel-source-2.6.8 - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2005:218","name":"http://www.mandriva.com/security/advisories?name=MDKSA-2005:218","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"],"title":"Advisories - Mandriva Linux","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.debian.org/security/2006/dsa-1017","name":"http://www.debian.org/security/2006/dsa-1017","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"],"title":"Debian -- Security Information -- DSA-1017-1 kernel-source-2.6.8","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/17826","name":"http://secunia.com/advisories/17826","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link","Vendor Advisory"],"title":"Secunia - Advisories - Mandriva update for kernel","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.redhat.com/support/errata/RHSA-2005-808.html","name":"http://www.redhat.com/support/errata/RHSA-2005-808.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link"],"title":"rhn.redhat.com | Red Hat Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://linux.bkbits.net:8080/linux-2.6/cset%404346883bQBeBd26syWTKX2CVC5bDcA","name":"http://linux.bkbits.net:8080/linux-2.6/cset%404346883bQBeBd26syWTKX2CVC5bDcA","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link"],"title":"","mime":"","httpstatus":"-1","archivestatus":"404"},{"url":"http://secunia.com/advisories/17114","name":"http://secunia.com/advisories/17114","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link","Vendor Advisory"],"title":"Secunia - Advisories - Linux Kernel Potential Denial of Service and Information Disclosure","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/17364","name":"http://secunia.com/advisories/17364","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link","Vendor Advisory"],"title":"Secunia - Advisories - Red Hat update for kernel","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/17917","name":"http://secunia.com/advisories/17917","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link","Vendor Advisory"],"title":"Secunia - Advisories - SUSE update for kernel","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2005:220","name":"http://www.mandriva.com/security/advisories?name=MDKSA-2005:220","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"],"title":"Advisories - Mandriva Linux","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/17280","name":"http://secunia.com/advisories/17280","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link","Vendor Advisory"],"title":"Secunia - Advisories - Fedora update for kernel","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.ubuntu.com/usn/usn-199-1","name":"http://www.ubuntu.com/usn/usn-199-1","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"],"title":"usn/usn-199-1 - Ubuntu Linux","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2005:235","name":"http://www.mandriva.com/security/advisories?name=MDKSA-2005:235","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"],"title":"Advisories - Mandriva Linux","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=829841146878e082613a49581ae252c071057c23","name":"http://kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=829841146878e082613a49581ae252c071057c23","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link"],"title":"kernel/git/torvalds/linux.git - Linux kernel source tree","mime":"text/html","httpstatus":"404","archivestatus":"200"},{"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2005:219","name":"http://www.mandriva.com/security/advisories?name=MDKSA-2005:219","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"],"title":"Advisories - Mandriva Linux","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/advisories/9549","name":"http://www.securityfocus.com/advisories/9549","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link","Third Party Advisory","VDB Entry"],"title":"Advisory: Fedora Core 3 Update: kernel-2.6.12-1.1380_FC3","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://www.securityfocus.com/archive/1/427980/100/0/threaded","name":"http://www.securityfocus.com/archive/1/427980/100/0/threaded","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link","Third Party Advisory","VDB Entry"],"title":"SecurityFocus","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9467","name":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9467","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link"],"title":"Repository  /  Oval Repository","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/advisories/9806","name":"http://www.securityfocus.com/advisories/9806","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link","Third Party Advisory","VDB Entry"],"title":"Advisory: kernel","mime":"text/html","httpstatus":"500","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/15076","name":"http://www.securityfocus.com/bid/15076","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link","Third Party Advisory","VDB Entry"],"title":"Linux Kernel Multiple Memory Leak Local Denial Of Service Vulnerabilities","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"http://kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=829841146878e082613a49581ae252c071057c23","name":"CONFIRM:http://kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=829841146878e082613a49581ae252c071057c23","refsource":"MITRE","tags":[],"title":"kernel/git/torvalds/linux.git - Linux kernel source tree","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://linux.bkbits.net:8080/linux-2.6/cset@4346883bQBeBd26syWTKX2CVC5bDcA","name":"CONFIRM:http://linux.bkbits.net:8080/linux-2.6/cset@4346883bQBeBd26syWTKX2CVC5bDcA","refsource":"MITRE","tags":[],"title":"","mime":"","httpstatus":"-1","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2005-3181","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2005-3181","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"n/a","product":"n/a","version":"affected n/a","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2005","cve_id":"3181","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"canonical","cpe5":"ubuntu_linux","cpe6":"4.10","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3181","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"canonical","cpe5":"ubuntu_linux","cpe6":"5.04","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3181","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"3.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3181","vulnerable":"1","versionEndIncluding":"2.6.13.3","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"linux","cpe5":"linux_kernel","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3181","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"mandriva","cpe5":"linux","cpe6":"10.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3181","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"mandriva","cpe5":"linux","cpe6":"10.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"3181","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"mandriva","cpe5":"linux","cpe6":"2006.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2024-08-07T23:01:58.486Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"name":"MDKSA-2005:235","tags":["vendor-advisory","x_refsource_MANDRIVA","x_transferred"],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2005:235"},{"name":"15076","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/15076"},{"name":"RHSA-2005:808","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"http://www.redhat.com/support/errata/RHSA-2005-808.html"},{"name":"17917","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/17917"},{"name":"SUSE-SA:2005:067","tags":["vendor-advisory","x_refsource_SUSE","x_transferred"],"url":"http://www.securityfocus.com/advisories/9806"},{"name":"MDKSA-2005:220","tags":["vendor-advisory","x_refsource_MANDRAKE","x_transferred"],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2005:220"},{"name":"17364","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/17364"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://linux.bkbits.net:8080/linux-2.6/cset%404346883bQBeBd26syWTKX2CVC5bDcA"},{"name":"MDKSA-2005:218","tags":["vendor-advisory","x_refsource_MANDRAKE","x_transferred"],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2005:218"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=829841146878e082613a49581ae252c071057c23"},{"name":"17280","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/17280"},{"name":"17826","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/17826"},{"name":"USN-199-1","tags":["vendor-advisory","x_refsource_UBUNTU","x_transferred"],"url":"http://www.ubuntu.com/usn/usn-199-1"},{"name":"FEDORA-2005-1007","tags":["vendor-advisory","x_refsource_FEDORA","x_transferred"],"url":"http://www.securityfocus.com/advisories/9549"},{"name":"FLSA:157459-3","tags":["vendor-advisory","x_refsource_FEDORA","x_transferred"],"url":"http://www.securityfocus.com/archive/1/427980/100/0/threaded"},{"name":"DSA-1017","tags":["vendor-advisory","x_refsource_DEBIAN","x_transferred"],"url":"http://www.debian.org/security/2006/dsa-1017"},{"name":"MDKSA-2005:219","tags":["vendor-advisory","x_refsource_MANDRAKE","x_transferred"],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2005:219"},{"name":"17114","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/17114"},{"name":"oval:org.mitre.oval:def:9467","tags":["vdb-entry","signature","x_refsource_OVAL","x_transferred"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9467"},{"name":"19374","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/19374"}],"title":"CVE Program Container"}],"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2005-10-06T00:00:00.000Z","descriptions":[{"lang":"en","value":"The audit system in Linux kernel 2.6.6, and other versions before 2.6.13.4, when CONFIG_AUDITSYSCALL is enabled, uses an incorrect function to free names_cache memory, which prevents the memory from being tracked by AUDITSYSCALL code and leads to a memory leak that allows attackers to cause a denial of service (memory consumption)."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2018-10-19T14:57:01.000Z","orgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","shortName":"redhat"},"references":[{"name":"MDKSA-2005:235","tags":["vendor-advisory","x_refsource_MANDRIVA"],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2005:235"},{"name":"15076","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/15076"},{"name":"RHSA-2005:808","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"http://www.redhat.com/support/errata/RHSA-2005-808.html"},{"name":"17917","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/17917"},{"name":"SUSE-SA:2005:067","tags":["vendor-advisory","x_refsource_SUSE"],"url":"http://www.securityfocus.com/advisories/9806"},{"name":"MDKSA-2005:220","tags":["vendor-advisory","x_refsource_MANDRAKE"],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2005:220"},{"name":"17364","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/17364"},{"tags":["x_refsource_CONFIRM"],"url":"http://linux.bkbits.net:8080/linux-2.6/cset%404346883bQBeBd26syWTKX2CVC5bDcA"},{"name":"MDKSA-2005:218","tags":["vendor-advisory","x_refsource_MANDRAKE"],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2005:218"},{"tags":["x_refsource_CONFIRM"],"url":"http://kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commitdiff%3Bh=829841146878e082613a49581ae252c071057c23"},{"name":"17280","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/17280"},{"name":"17826","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/17826"},{"name":"USN-199-1","tags":["vendor-advisory","x_refsource_UBUNTU"],"url":"http://www.ubuntu.com/usn/usn-199-1"},{"name":"FEDORA-2005-1007","tags":["vendor-advisory","x_refsource_FEDORA"],"url":"http://www.securityfocus.com/advisories/9549"},{"name":"FLSA:157459-3","tags":["vendor-advisory","x_refsource_FEDORA"],"url":"http://www.securityfocus.com/archive/1/427980/100/0/threaded"},{"name":"DSA-1017","tags":["vendor-advisory","x_refsource_DEBIAN"],"url":"http://www.debian.org/security/2006/dsa-1017"},{"name":"MDKSA-2005:219","tags":["vendor-advisory","x_refsource_MANDRAKE"],"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2005:219"},{"name":"17114","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/17114"},{"name":"oval:org.mitre.oval:def:9467","tags":["vdb-entry","signature","x_refsource_OVAL"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9467"},{"name":"19374","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/19374"}]}},"cveMetadata":{"assignerOrgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","assignerShortName":"redhat","cveId":"CVE-2005-3181","datePublished":"2005-10-11T04:00:00.000Z","dateReserved":"2005-10-11T00:00:00.000Z","dateUpdated":"2024-08-07T23:01:58.486Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"},"nvd":{"publishedDate":"2005-10-12 13:04:00","lastModifiedDate":"2025-04-03 01:03:51","problem_types":["CWE-401","n/a"],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:N/A:P","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.6.0","versionEndIncluding":"2.6.13.3","matchCriteriaId":"A9F602FA-8F83-4EF9-A35F-2904E977205F"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:canonical:ubuntu_linux:4.10:*:*:*:*:*:*:*","matchCriteriaId":"778A6957-455B-420A-BAAF-E7F88FF4FB1E"},{"vulnerable":true,"criteria":"cpe:2.3:o:canonical:ubuntu_linux:5.04:*:*:*:*:*:*:*","matchCriteriaId":"42E47538-08EE-4DC1-AC17-883C44CF77BB"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:3.1:*:*:*:*:*:*:*","matchCriteriaId":"A2E0C1F8-31F5-4F61-9DF7-E49B43D3C873"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:mandriva:linux:10.1:*:*:*:*:*:*:*","matchCriteriaId":"E14FC74C-2341-4582-81B2-CD8A89033632"},{"vulnerable":true,"criteria":"cpe:2.3:o:mandriva:linux:10.2:*:*:*:*:*:*:*","matchCriteriaId":"DFC1CA0A-375F-40D6-9A2A-383B48F4778A"},{"vulnerable":true,"criteria":"cpe:2.3:o:mandriva:linux:2006.0:*:*:*:*:*:*:*","matchCriteriaId":"B501B8B6-338B-4E1E-843D-905D335E426B"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2005","CveId":"3181","Ordinal":"1","Title":"CVE-2005-3181","CVE":"CVE-2005-3181","Year":"2005"},"notes":[{"CveYear":"2005","CveId":"3181","Ordinal":"1","NoteData":"The audit system in Linux kernel 2.6.6, and other versions before 2.6.13.4, when CONFIG_AUDITSYSCALL is enabled, uses an incorrect function to free names_cache memory, which prevents the memory from being tracked by AUDITSYSCALL code and leads to a memory leak that allows attackers to cause a denial of service (memory consumption).","Type":"Description","Title":"CVE-2005-3181"},{"CveYear":"2005","CveId":"3181","Ordinal":"2","NoteData":"2005-10-11","Type":"Other","Title":"Published"},{"CveYear":"2005","CveId":"3181","Ordinal":"3","NoteData":"2018-10-19","Type":"Other","Title":"Modified"}]}}}