2.1
CVSSv2

CVE-2004-0427

Published: 07/07/2004 Updated: 26/01/2024
CVSS v2 Base Score: 2.1 | Impact Score: 2.9 | Exploitability Score: 3.9
VMScore: 187
Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

The do_fork function in Linux 2.4.x prior to 2.4.26, and 2.6.x prior to 2.6.6, does not properly decrement the mm_count counter when an error occurs after the mm_struct for a child process has been activated, which triggers a memory leak that allows local users to cause a denial of service (memory exhaustion) via the clone (CLONE_VM) system call.

Vulnerable Product Search on Vulmon Subscribe to Product

linux linux kernel

Vendor Advisories

Synopsis kernel security update Type/Severity Security Advisory: Important Topic Updated Itanium kernel packages that fix a number of security issues arenow available Description The Linux kernel handles the basic functions of the operating systemThis kernel updates several important driv ...
Synopsis kernel security update Type/Severity Security Advisory: Important Topic Updated kernel packages for Red Hat Enterprise Linux 3 that fix securityvulnerabilities are now available Description The Linux kernel handles the basic functions of the operating systemA flaw was found in Li ...
Several local and remote vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or the execution of arbitrary code The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2004-0427 A local denial of service vulnerability in do_fork() has been found CVE-2005-0489 A ...
Several local and remote vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or the execution of arbitrary code The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2004-0427 A local denial of service vulnerability in do_fork() has been found CVE-2005-0489 A ...
Several local and remote vulnerabilities have been discovered in the Linux kernel that may lead to a denial of service or the execution of arbitrary code The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2004-0427 A local denial of service vulnerability in do_fork() has been found CVE-2005-0489 A ...

References

CWE-401ftp://patches.sgi.com/support/free/security/advisories/20040504-01-U.ascftp://patches.sgi.com/support/free/security/advisories/20040505-01-U.aschttp://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000846http://fedoranews.org/updates/FEDORA-2004-111.shtmlhttp://security.gentoo.org/glsa/glsa-200407-02.xmlhttp://www.novell.com/linux/security/advisories/2004_10_kernel.htmlhttp://www.redhat.com/support/errata/RHSA-2004-255.htmlhttp://www.redhat.com/support/errata/RHSA-2004-260.htmlhttp://www.redhat.com/support/errata/RHSA-2004-327.htmlhttp://www.turbolinux.com/security/2004/TLSA-2004-14.txthttp://www.ciac.org/ciac/bulletins/o-164.shtmlhttp://www.securityfocus.com/bid/10221http://secunia.com/advisories/11429http://secunia.com/advisories/11464http://secunia.com/advisories/11486http://secunia.com/advisories/11541http://secunia.com/advisories/11861http://secunia.com/advisories/11891http://secunia.com/advisories/11892http://www.debian.org/security/2006/dsa-1070http://www.debian.org/security/2006/dsa-1067http://www.debian.org/security/2006/dsa-1069http://secunia.com/advisories/20162http://secunia.com/advisories/20163http://secunia.com/advisories/20202http://www.debian.org/security/2006/dsa-1082http://secunia.com/advisories/20338http://www.mandriva.com/security/advisories?name=MDKSA-2004:037http://marc.info/?l=linux-kernel&m=108139073506983&w=2https://exchange.xforce.ibmcloud.com/vulnerabilities/16002https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2819https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10297http://linux.bkbits.net:8080/linux-2.6/cset%40407b1217x4jtqEkpFW2g_-RcF0726Ahttp://linux.bkbits.net:8080/linux-2.4/cset%40407bf20eDeeejm8t36_tpvSE-8EFHAhttps://access.redhat.com/errata/RHSA-2004:327https://nvd.nist.govhttps://www.debian.org/security/./dsa-1067