oss-sec mailing list archives
Re: CVE request: kernel: oom: fix integer overflow of points in oom_badness
From: Kurt Seifried <kseifried () redhat com>
Date: Mon, 31 Oct 2011 19:05:13 -0600
On 10/31/2011 06:09 PM, Eugene Teo wrote:
An integer overflow will happen on 64bit archs if task's sum of rss, swapents and nr_ptes exceeds (2^31)/1000 value. This was introduced by commit f755a04 oom: use pte pages in OOM score. This can cause a denial of service. https://lkml.org/lkml/2011/10/31/138 Eugene
Please use CVE-2011-4097 for this issue -- -Kurt Seifried / Red Hat Security Response Team
Current thread:
- CVE request: kernel: oom: fix integer overflow of points in oom_badness Eugene Teo (Oct 31)
- Re: CVE request: kernel: oom: fix integer overflow of points in oom_badness Kurt Seifried (Oct 31)