Re: Local DoS in kernel 2.6.26
-----BEGIN PGP SIGNED MESSAGE-----
On Tue, Oct 27, 2009 at 05:27:58PM +0500, surreal wrote:
> I just caught hold of a C source code from 2005. This code is a local DoS
> which fills up the entire memory on Linux 2.6.N kernels.
I guess you are talking about CVE-2008-5300 . What happens there is
that this program exhausts _kernel_ memory due to a bug. This bug is
fixed in 126.96.36.199 
This has _nothing_ to do with the process taking 100% CPU: if they are
available it would be a bug _not_ to give them to a process requesting
it. The question is whether other processes get starved or get their
share of resources.
And the "classical" fork bomb posted elsewhere in this thread isnt a
problem either: it is only possible whenever the process has enough
permissions to hog resources. Cf. the manpage of ulimit to learn more.
Folks, do your research.
Ah. BTW. This is way off topic for this list.
- -- tomás
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
-----END PGP SIGNATURE-----