CVE-2011-2484

Priority
Description
The add_del_listener function in kernel/taskstats.c in the Linux kernel
2.6.39.1 and earlier does not prevent multiple registrations of exit
handlers, which allows local users to cause a denial of service (memory and
CPU consumption), and bypass the OOM Killer, via a crafted application.
Ubuntu-Description
Vasiliy Kulikov discovered that taskstats listeners were not correctly
handled. A local attacker could expoit this to exhaust memory and CPU
resources, leading to a denial of service.
Notes
Package
Source: linux (LP Ubuntu Debian)
Upstream:released (3.0~rc5)
Ubuntu 14.04 ESM (Trusty Tahr):not-affected (3.11.0-12.19)
Patches:
Introduced by
f9fd8914c1acca0d98b69d831b128d5b52f03c51
Fixed by
26c4caea9d697043cc5a458b96411b86d7f6babd
Package
Upstream:released (3.0~rc5)
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Package
Upstream:released (3.0~rc5)
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was not-affected [3.4.0-1.3])
Package
Upstream:released (3.0~rc5)
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Package
Upstream:released (3.0~rc5)
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was not-affected [3.4.0-1.7])
Package
Upstream:released (3.0~rc5)
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was not-affected [3.1.10-8.28])
Package
Upstream:released (3.0~rc5)
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Package
Upstream:released (3.0~rc5)
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Package
Upstream:released (3.0~rc5)
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Package
Upstream:released (3.0~rc5)
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was not-affected [3.0.0-3.18])
Package
Upstream:released (3.0~rc5)
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was not-affected [3.4.0-3.21])
Package
Upstream:released (3.0~rc5)
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was not-affected [3.4.0-4.19])
Package
Upstream:released (3.0~rc5)
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Package
Upstream:released (3.0~rc5)
Ubuntu 14.04 ESM (Trusty Tahr):DNE
More Information

Updated: 2019-12-05 20:57:19 UTC (commit 0aa5e7c87c8b55d2ec5c7f4ca1179cf75de91961)