First published: Fri Aug 20 2010(Updated: )
Description of problem: This issue was mentioned in <a href="http://grsecurity.net/~spender/64bit_dos.c">http://grsecurity.net/~spender/64bit_dos.c</a>. Written in the comments: "The second bug here is that the memory usage explodes within the kernel from a single 128k allocation in userland The explosion of memory isn't accounted for by any task so it won't be terminated by the OOM killer." Acknowledgements: Red Hat would like to thank Brad Spengler for reporting this issue.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | <2.6.37 | |
debian/linux-2.6 | ||
debian/user-mode-linux |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.