** Description changed: - kernel: request_module() OOM local DoS + The __request_module function in kernel/kmod.c in the Linux kernel + before 3.4 does not set a certain killable attribute, which allows local + users to cause a denial of service (memory consumption) via a crafted + application. Break-Fix: - 70834d3070c3f3015ab5c05176d54bd4a0100546 Break-Fix: - b3449922502f5a161ee2b5022a33aec8472fbf18 Break-Fix: - d0bd587a80960d7ba7e0c8396e154028c9045c54 Break-Fix: - 9d944ef32e83405a07376f112e9f02161d3e9731 Break-Fix: - 5b9bd473e3b8a8c6c4ae99be475e6e9b27568555 Break-Fix: - 3e63a93b987685f02421e18b2aa452d20553a88b Break-Fix: - 1cc684ab75123efe7ff446eb821d44375ba8fa30
-- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/963685 Title: Please consider backporting killable request_module() patchset To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/963685/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs