** Description changed:

- kernel: request_module() OOM local DoS
+ The __request_module function in kernel/kmod.c in the Linux kernel
+ before 3.4 does not set a certain killable attribute, which allows local
+ users to cause a denial of service (memory consumption) via a crafted
+ application.
  
  Break-Fix: - 70834d3070c3f3015ab5c05176d54bd4a0100546
  Break-Fix: - b3449922502f5a161ee2b5022a33aec8472fbf18
  Break-Fix: - d0bd587a80960d7ba7e0c8396e154028c9045c54
  Break-Fix: - 9d944ef32e83405a07376f112e9f02161d3e9731
  Break-Fix: - 5b9bd473e3b8a8c6c4ae99be475e6e9b27568555
  Break-Fix: - 3e63a93b987685f02421e18b2aa452d20553a88b
  Break-Fix: - 1cc684ab75123efe7ff446eb821d44375ba8fa30

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/963685

Title:
  Please consider backporting killable request_module() patchset

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/963685/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to