Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 14 Jun 2000 23:45:59 -0500 (CDT)
From:      Mike Silbersack <silby@silby.com>
To:        freebsd-security@freebsd.org
Subject:   Re: Local FreeBSD, Openbsd, NetBSD, DoS Vulnerability - Mac OS X affected
Message-ID:  <Pine.BSF.4.21.0006142340120.34311-100000@achilles.silby.com>
In-Reply-To: <20000614174706.F78775@closed-networks.com>

next in thread | previous in thread | raw e-mail | index | archive | help

On Wed, 14 Jun 2000, User Datagram Protocol wrote:

> Eww. What a lame DoS attack.
> 
> On Wed, Aug 02, 2000 at 08:41:53AM -0300, Ussr Labs wrote:
> > an unpriviledged user can panic the kernel. Quick and dirty testing
> > 
> ...
> 
> Big deal. So what do we do about it? Implement per-process mbuf usage limits?
> Eww.

Good news. Jonathan Lemon committed the mbuf wait MFC to the 3 branch a
few days ago, so we can now simply tell people to cvsup if they're worried
about someone trying a mbuf exhaustion on them.

(Granted, the handling of such an attack isn't perfect for all cases, but
the panic is gone.)

Mike "Silby" Silbersack





To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.21.0006142340120.34311-100000>