Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Fri, 26 Nov 2010 16:00:35 +0100
From: Thomas Biege <thomas@...e.de>
To: oss-security@...ts.openwall.com
Subject: Re: CVE request: kernel: unix socket local dos


JFYI, additional comments

http://lkml.org/lkml/2010/11/25/8



Am Mittwoch, 24. November 2010, 04:03:27 schrieb Eugene Teo:
> Reported by Vegard Nossum: "I found this program lying around on my
> laptop. It kills my box (2.6.35) instantly by consuming a lot of memory
> (allocated by the kernel, so the process doesn't get killed by the OOM
> killer). As far as I can tell, the memory isn't being freed when the
> program exits either. Maybe it will eventually get cleaned up the UNIX
> socket garbage collector thing, but in that case it doesn't get called
> quickly enough to save my machine at least."
> 
> Reproducer: http://lkml.org/lkml/2010/11/23/395
> Partial fix: http://lkml.org/lkml/2010/11/23/450
> Reference: https://bugzilla.redhat.com/show_bug.cgi?id=656756
> 
> Thanks, Eugene


-- 
 Thomas Biege <thomas@...e.de>, SUSE LINUX, Security Support & Auditing
 SUSE LINUX Products GmbH, GF: Markus Rex, HRB 16746 (AG Nuernberg)

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.