Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Wed, 24 Nov 2010 11:03:27 +0800
From: Eugene Teo <eugene@...hat.com>
To: oss-security@...ts.openwall.com
CC: "Steven M. Christey" <coley@...us.mitre.org>
Subject: CVE request: kernel: unix socket local dos

Reported by Vegard Nossum: "I found this program lying around on my 
laptop. It kills my box (2.6.35) instantly by consuming a lot of memory 
(allocated by the kernel, so the process doesn't get killed by the OOM 
killer). As far as I can tell, the memory isn't being freed when the 
program exits either. Maybe it will eventually get cleaned up the UNIX 
socket garbage collector thing, but in that case it doesn't get called 
quickly enough to save my machine at least."

Reproducer: http://lkml.org/lkml/2010/11/23/395
Partial fix: http://lkml.org/lkml/2010/11/23/450
Reference: https://bugzilla.redhat.com/show_bug.cgi?id=656756

Thanks, Eugene

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ