First published: Fri Apr 30 2004(Updated: )
The do_fork function in Linux 2.4.x before 2.4.26, and 2.6.x before 2.6.6, does not properly decrement the mm_count counter when an error occurs after the mm_struct for a child process has been activated, which triggers a memory leak that allows local users to cause a denial of service (memory exhaustion) via the clone (CLONE_VM) system call.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linux kernel | >=2.4.0<2.4.26 | |
Linux kernel | >=2.6.0<2.6.6 | |
Linux kernel | =2.6.0 | |
Linux kernel | =2.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-0427 is considered a high severity vulnerability due to the potential for local users to exploit it for denial of service.
To fix CVE-2004-0427, upgrade the Linux kernel to version 2.4.26 or 2.6.6 or later.
CVE-2004-0427 is caused by a flaw in the do_fork function that improperly manages the mm_count counter leading to memory leaks.
CVE-2004-0427 affects Linux kernel versions 2.4.x before 2.4.26 and 2.6.x before 2.6.6.
CVE-2004-0427 cannot be exploited remotely as it requires local user access to the system.