First published: Wed Oct 30 2013(Updated: )
A flaw was found in the way ipc_rcu_putref() function handled reference counter decrementing. Without external synchronization reference counter might not be adjusted properly, as presented with the freeque() vs do_msgsnd() race, leading to memory leaks. An unprivileged local user could use this flaw to cause OOM conditions, potentially crashing the system. References: <a href="https://wiki.openvz.org/Download/kernel/rhel6-testing/042stab084.3">https://wiki.openvz.org/Download/kernel/rhel6-testing/042stab084.3</a> Upstream patch: <a href="http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6062a8">http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6062a8</a> (making the refcounter atomic hunks) Acknowledgements: Red Hat would like to thank Vladimir Davydov (Parallels) for reporting this issue.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Linux kernel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1024854 is classified as a memory leak vulnerability that can be exploited by unprivileged local users.
To fix REDHAT-BUG-1024854, ensure you apply the latest kernel updates provided by Red Hat for your system.
Users of the Red Hat Linux kernel are affected by the vulnerability referenced by REDHAT-BUG-1024854.
The impact of REDHAT-BUG-1024854 includes potential memory leaks which can lead to resource exhaustion.
There is no specific workaround for REDHAT-BUG-1024854, and the recommended action is to update the kernel to the patched version.