2.1
CWE
NVD-CWE-Other 401
Advisory Published
Updated

CVE-2004-0427

First published: Fri Apr 30 2004(Updated: )

The do_fork function in Linux 2.4.x before 2.4.26, and 2.6.x before 2.6.6, does not properly decrement the mm_count counter when an error occurs after the mm_struct for a child process has been activated, which triggers a memory leak that allows local users to cause a denial of service (memory exhaustion) via the clone (CLONE_VM) system call.

Credit: cve@mitre.org

Affected SoftwareAffected VersionHow to fix
Linux kernel>=2.4.0<2.4.26
Linux kernel>=2.6.0<2.6.6
Linux kernel=2.6.0
Linux kernel=2.4.0

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Reference Links

Frequently Asked Questions

  • What is the severity of CVE-2004-0427?

    CVE-2004-0427 is considered a high severity vulnerability due to the potential for local users to exploit it for denial of service.

  • How do I fix CVE-2004-0427?

    To fix CVE-2004-0427, upgrade the Linux kernel to version 2.4.26 or 2.6.6 or later.

  • What causes CVE-2004-0427?

    CVE-2004-0427 is caused by a flaw in the do_fork function that improperly manages the mm_count counter leading to memory leaks.

  • Which Linux kernel versions are affected by CVE-2004-0427?

    CVE-2004-0427 affects Linux kernel versions 2.4.x before 2.4.26 and 2.6.x before 2.6.6.

  • Can CVE-2004-0427 be exploited remotely?

    CVE-2004-0427 cannot be exploited remotely as it requires local user access to the system.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203