*** This bug is a security vulnerability ***

Public security bug reported:

Binary package hint: openssh-server

All child processes of openssh-server inherit the oom_adj value of -17
which makes the unkillable in low memory situation. Any user logged into
the machine via ssh can cause a kernel-panic by creating a process that
simply consumes memory.

I have reported this before for Hardy (Bug #293000). Upstream Debian
fixes were shipped in Intrepid, Jaunty has the problem again.

Please fix openssh to degrade child processes to a higher oom_adj value.

** Affects: openssh (Ubuntu)
     Importance: Undecided
         Status: New

** Visibility changed to: Public

-- 
openssh-server dos regression in jaunty (oom_adj)
https://bugs.launchpad.net/bugs/390556
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to