First published: Thu Mar 03 2016(Updated: )
Kernel memory leak in the CUSE driver using stress-ng was found. It is possible for privileged attacker to cause a local DoS via memory exhaustion by repeatedly opening /dev/cuse for reading. Upstream patch: <a href="https://git.kernel.org/linus/2c5816b4beccc8ba709144539f6fdd764f8fa49c">https://git.kernel.org/linus/2c5816b4beccc8ba709144539f6fdd764f8fa49c</a> References: <a href="https://bugzilla.novell.com/show_bug.cgi?id=969356">https://bugzilla.novell.com/show_bug.cgi?id=969356</a> <a href="http://seclists.org/oss-sec/2016/q1/495">http://seclists.org/oss-sec/2016/q1/495</a>
Credit: security@ubuntu.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/linux | 5.10.218-1 5.10.221-1 6.1.94-1 6.1.99-1 6.9.12-1 6.10.3-1 | |
redhat/kernel | <4.4 | 4.4 |
Linux Kernel | <=4.3.6 | |
SUSE Linux Enterprise Debuginfo | =11-sp4 | |
SUSE Linux Enterprise Real Time Extension | =11-sp4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-1339 has been classified as a medium severity vulnerability due to its potential for local denial of service through memory exhaustion.
To mitigate CVE-2015-1339, ensure that your kernel is updated to a version that has patched this issue, such as 5.10.218-1 or later.
CVE-2015-1339 affects Linux kernel versions prior to certain patched versions, specifically those listed in the affected software section.
An attacker can exploit CVE-2015-1339 to locally cause a denial of service by exhausting system memory.
No, CVE-2015-1339 is a local vulnerability that requires privileged access to exploit.