Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2004-0427

Overview

Vulnerability Score 2.1 2.1
CVE Id CVE-2004-0427
Last Modified 21 Aug 2010 12:20:28
Published 07 Jul 2004 12:00:00
Confidentiality Impact NONE NONE
Integrity Impact NONE NONE
Availability Impact PARTIAL PARTIAL
Access Vector LOCAL
Access Complexity LOW
Authentication NONE

CVE-2004-0427

Summary

The do_fork function in Linux 2.4.x before 2.4.26, and 2.6.x before 2.6.6, does not properly decrement the mm_count counter when an error occurs after the mm_struct for a child process has been activated, which triggers a memory leak that allows local users to cause a denial of service (memory exhaustion) via the clone (CLONE_VM) system call.

Vulnerable Systems

Operating System

  • Linux Kernel 2.4.0

  • Linux Kernel 2.6.0


References

MLIST - [linux-kernel] 20040408 [PATCH]: 2.4/2.6 do_fork() error path memory leak

SGI - 20040505-01-U

SGI - 20040504-01-U

REDHAT - RHSA-2004:255

SUSE - SuSE-SA:2004:010

GENTOO - GLSA-200407-02

MISC - http://linux.bkbits.net:8080/linux-2.6/cset@407b1217x4jtqEkpFW2g_-RcF0726A

MISC - http://linux.bkbits.net:8080/linux-2.4/cset@407bf20eDeeejm8t36_tpvSE-8EFHA

FEDORA - FEDORA-2004-111

CONECTIVA - CLA-2004:846

XF - linux-dofork-memory-leak(16002)

TURBO - TLSA-2004-14

BID - 10221

REDHAT - RHSA-2004:327

REDHAT - RHSA-2004:260

MANDRAKE - MDKSA-2004:037

DEBIAN - DSA-1082

DEBIAN - DSA-1070

DEBIAN - DSA-1069

DEBIAN - DSA-1067

CIAC - O-164

SECUNIA - 20338

SECUNIA - 20202

SECUNIA - 20163

SECUNIA - 20162

SECUNIA - 11892

SECUNIA - 11891

SECUNIA - 11861

SECUNIA - 11541

SECUNIA - 11486

SECUNIA - 11464

SECUNIA - 11429


Last Updated: 27 May 2016 10:38:36