CVE-2004-0427

NameCVE-2004-0427
DescriptionThe do_fork function in Linux 2.4.x before 2.4.26, and 2.6.x before 2.6.6, does not properly decrement the mm_count counter when an error occurs after the mm_struct for a child process has been activated, which triggers a memory leak that allows local users to cause a denial of service (memory exhaustion) via the clone (CLONE_VM) system call.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDSA-1067-1, DSA-1069-1, DSA-1070-1, DSA-1082-1

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
kernel-image-sparc-2.4sourcewoody26woody1DSA-1070-1
kernel-patch-2.4.19-mipssourcewoody2.4.19-0.020911.1.woody5DSA-1070-1
kernel-source-2.4.16sourcewoody2.4.16-1woody2DSA-1067-1
kernel-source-2.4.17sourcewoody2.4.17-1woody4DSA-1082-1
kernel-source-2.4.18sourcewoody2.4.18-14.4DSA-1069-1
kernel-source-2.4.19sourcewoody2.4.19-4.woody3DSA-1070-1
kernel-source-2.4.27source(unstable)(not affected)
linux-2.6source(unstable)(not affected)

Notes

- linux-2.6 <not-affected> (Fixed before upload of linux-2.6 package into the archive; 2.6.6)
- kernel-source-2.4.27 <not-affected> (Fixed before upload of package into the archive; 2.4.26)

Search for package or bug name: Reporting problems