According to Debian Bug #559035 latest hardy kernel amd64 version is affected from same bug.
this can be reproduced by launching $ for ((i = 0; i <= 100000; i++)); do exim4 -bV || break; done > /dev/null; echo "last: $i"
the machine isn't affected anymore by setting $ sudo sysctl kernel/randomize_va_space=0
so the problem is process address space randomization. Here's the commit: http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=80938332d8cf652f6b16e0788cf0ca136befe0b5
Please evaluate it, it's a serious bug.
--Sergio
According to Debian Bug #559035 latest hardy kernel amd64 version is affected from same bug.
this can be reproduced by launching
$ for ((i = 0; i <= 100000; i++)); do exim4 -bV || break; done > /dev/null; echo "last: $i"
the machine isn't affected anymore by setting randomize_ va_space= 0
$ sudo sysctl kernel/
so the problem is process address space randomization. Here's the commit: git.kernel. org/?p= linux/kernel/ git/torvalds/ linux-2. 6.git;a= commitdiff; h=80938332d8cf6 52f6b16e0788cf0 ca136befe0b5
http://
Please evaluate it, it's a serious bug.
--Sergio