SB2013082502 - Memory leak in Linux kernel
Published: August 25, 2013 Updated: August 10, 2020
Security Bulletin ID
SB2013082502
Severity
Medium
Patch available
NO
Number of vulnerabilities
1
Exploitation vector
Local access
Highest impact
Denial of service
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Memory leak (CVE-ID: CVE-2013-4205)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the unshare_userns function in kernel/user_namespace.c in the Linux kernel before 3.10.6 allows local users to cause a denial of service (memory consumption) via an invalid CLONE_NEWUSER unshare call. A remote attacker can perform a denial of service attack.
Remediation
Cybersecurity Help is not aware of any official remediation provided by the vendor.
References
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=6160968cee8b90a5dd95318d716e31d7775c4ef3
- http://twitter.com/grsecurity/statuses/364566062336978944
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.10.6
- http://www.openwall.com/lists/oss-security/2013/08/06/2
- http://www.ubuntu.com/usn/USN-1971-1
- http://www.ubuntu.com/usn/USN-1974-1
- https://github.com/torvalds/linux/commit/6160968cee8b90a5dd95318d716e31d7775c4ef3