First published: Thu Mar 03 2016(Updated: )
Kernel memory leak in the CUSE driver using stress-ng was found. It is possible for privileged attacker to cause a local DoS via memory exhaustion by repeatedly opening /dev/cuse for reading. Upstream patch: <a href="https://git.kernel.org/linus/2c5816b4beccc8ba709144539f6fdd764f8fa49c">https://git.kernel.org/linus/2c5816b4beccc8ba709144539f6fdd764f8fa49c</a> References: <a href="https://bugzilla.novell.com/show_bug.cgi?id=969356">https://bugzilla.novell.com/show_bug.cgi?id=969356</a> <a href="http://seclists.org/oss-sec/2016/q1/495">http://seclists.org/oss-sec/2016/q1/495</a>
Credit: security@ubuntu.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | <=4.3.6 | |
Novell Suse Linux Enterprise Debuginfo | =11-sp4 | |
Novell Suse Linux Enterprise Real Time Extension | =11-sp4 | |
debian/linux | 5.10.218-1 5.10.221-1 6.1.94-1 6.1.99-1 6.9.12-1 6.10.3-1 | |
redhat/kernel | <4.4 | 4.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.