On Tue, Nov 29, 2011 at 07:52:52AM -, Jan Rathmann wrote:
What does 'ulimit -u' show from a terminal on this system?
31517 is the output. My system has 4 GB of RAM.
Do you think it is appropriate for this case to open a new bug report
against the kernel?
Yes, please. If the limit
Am 28.11.2011 17:17, schrieb Steve Langasek:
How does it crash?
I apologize if the term crash was a bit unprecise. It does not crash
in sense of hard-locking (where only Reset switch will revive it again),
but it becomes totally unresponsive due to excessive swapping.
Yesterday I let the fork
I just did the fork bomb test (entering :(){ :|:};: in a terminal) on my
Oneiric installation, and it still crashes the system.
This should not happen if I get this report right, so perhaps the report should
be re-opened?
A workaround for me is adding lines like
* hard nproc 4096
to
On Mon, Nov 28, 2011 at 11:03:45AM -, Jan Rathmann wrote:
I just did the fork bomb test (entering :(){ :|:};: in a terminal) on
my Oneiric installation, and it still crashes the system.
How does it crash?
What does 'ulimit -u' show from a terminal on this system?
This should not happen
Lucid LTS?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/391761
Title:
process limit unlimited (regression)
--
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
Fixed in oneiric with the merge of pam 1.1.2-3. Changelog:
pam (1.1.2-3) unstable; urgency=low
[ Kees Cook ]
* 027_pam_limits_better_init_allow_explicit_root: load rlimit defaults
from the kernel (via /proc/1/limits), instead of continuing to hardcode
the settings internally. Fall
ETA or process for fix release? We're using workarounds in an HPC
environment.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/391761
Title:
process limit unlimited (regression)
--
ubuntu-bugs
For oneiric this will be fixed soon with an updated pam package. For
existing Ubuntu releases, we have not committed to providing an update.
A workaround for this is to add a line such as the following to
/etc/security/limits.conf:
* hard nproc 4096
(you may wish to adjust the value of the
** Branch linked: lp:debian/pam
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/391761
Title:
process limit unlimited (regression)
--
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
** Changed in: pam (Ubuntu)
Assignee: (unassigned) = Kees Cook (kees)
** Changed in: pam (Ubuntu)
Status: Triaged = Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/391761
Please switch this to importance high! This isn't only a small issue
with fork bombs:
I just stopped my system just by accidently holding down enter for a second
while a video file in nautilus was highlighted. This spawned a vast amount of
VLC players which in turn results in excessive
Maybe just deliver a reasonably large static limit in
/etc/security/limits.conf for all users? That would quick fix the
security concerns till this bug is fixed and obsoletes it.
--
process limit unlimited (regression)
https://bugs.launchpad.net/bugs/391761
You received this bug notification
Right, side-effect of having fixed the
027_pam_limits_better_init_allow_explicit_root patch so that it's
operational again.
I guess we need to duplicate the kernel's logic here for setting the
NPROC default.
** Changed in: pam (Ubuntu)
Status: Confirmed = Triaged
--
process limit
** Changed in: pam (Ubuntu)
Importance: Undecided = High
** Changed in: pam (Ubuntu)
Status: New = Confirmed
--
process limit unlimited (regression)
https://bugs.launchpad.net/bugs/391761
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed
Noted from:
http://dancingpenguinsoflight.com/2009/06/watching-a-fork-bomb-explode/
--
process limit unlimited (regression)
https://bugs.launchpad.net/bugs/391761
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
ubuntu-bugs mailing
** Changed in: pam (Ubuntu)
Importance: High = Low
** This bug has been flagged as a security vulnerability
--
process limit unlimited (regression)
https://bugs.launchpad.net/bugs/391761
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to
** Tags added: regression-release
--
process limit unlimited (regression)
https://bugs.launchpad.net/bugs/391761
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
--
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
17 matches
Mail list logo