Vulnerability Description
Race condition in ebtables netfilter module (ebtables.c) in Linux 2.6, when running on an SMP system that is operating under a heavy load, might allow remote attackers to cause a denial of service (crash) via a series of packets that cause a value to be modified after it has been read but before it has been locked.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | 2.6.0 |
References
- http://secunia.com/advisories/17141
- http://secunia.com/advisories/17364
- http://secunia.com/advisories/17918
- http://secunia.com/advisories/18056
- http://sourceforge.net/mailarchive/forum.php?thread_id=6800453&forum_id=8572
- http://www.debian.org/security/2005/dsa-922
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:072
- http://www.redhat.com/support/errata/RHSA-2005-808.html
- http://www.securityfocus.com/archive/1/419522/100/0/threaded
- http://www.securityfocus.com/archive/1/427980/100/0/threaded
- http://www.securityfocus.com/bid/15049
- http://www.ubuntu.com/usn/usn-199-1
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3
- http://secunia.com/advisories/17141
- http://secunia.com/advisories/17364
FAQ
What is CVE-2005-3110?
CVE-2005-3110 is a vulnerability with a CVSS score of 2.6 (LOW). Race condition in ebtables netfilter module (ebtables.c) in Linux 2.6, when running on an SMP system that is operating under a heavy load, might allow remote attackers to cause a denial of service (cr...
How severe is CVE-2005-3110?
CVE-2005-3110 has been rated LOW with a CVSS base score of 2.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2005-3110?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel.