[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: Local DoS in kernel 2.6.26



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On Tue, Oct 27, 2009 at 05:27:58PM +0500, surreal wrote:
> I just caught hold of a C source code from 2005. This code is a local DoS
> which fills up the entire memory on Linux 2.6.N kernels.

I guess you are talking about CVE-2008-5300 [1]. What happens there is
that this program exhausts _kernel_ memory due to a bug. This bug is
fixed in 2.6.27.8 [2]

This has _nothing_ to do with the process taking 100% CPU: if they are
available it would be a bug _not_ to give them to a process requesting
it. The question is whether other processes get starved or get their
share of resources.

And the "classical" fork bomb posted elsewhere in this thread isnt a
problem either: it is only possible whenever the process has enough
permissions to hog resources. Cf. the manpage of ulimit to learn more.

Folks, do your research.

Ah. BTW. This is way off topic for this list.

Regards

[1] <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5300>
[2] <http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.27.8>

- -- tomás
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFK5/UoBcgs9XrR2kYRAj2DAJ9b36RSOZTDDrBwlqBp9kYnppbgkwCePQhE
EjDxw5m0bfHCpXdBxu2kNak=
=eweX
-----END PGP SIGNATURE-----


Reply to: