From owner-freebsd-security Mon May 29 15:36:44 2000 Delivered-To: freebsd-security@freebsd.org Received: from silby.com (cb34181-a.mdsn1.wi.home.com [24.14.173.39]) by hub.freebsd.org (Postfix) with SMTP id CDAF037B7D9 for ; Mon, 29 May 2000 15:36:41 -0700 (PDT) (envelope-from silby@silby.com) Received: (qmail 41458 invoked by uid 1000); 29 May 2000 22:36:40 -0000 Received: from localhost (sendmail-bs@127.0.0.1) by localhost with SMTP; 29 May 2000 22:36:40 -0000 Date: Mon, 29 May 2000 17:36:40 -0500 (CDT) From: Mike Silbersack To: security@freebsd.org Subject: NetBSD Security Advisory 2000-005 (fwd) Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org Out of curiosity; does anyone know if this vaguely defined problem affects freebsd? Mike "Silby" Silbersack ---------- Forwarded message ---------- Date: Sun, 28 May 2000 23:47:24 -0400 From: NetBSD Security Officer To: BUGTRAQ@SECURITYFOCUS.COM Subject: NetBSD Security Advisory 2000-005 -----BEGIN PGP SIGNED MESSAGE----- NetBSD Security Advisory 2000-005 ================================= Topic: Local "cpu-hog" denial of service Version: all versions prior to 2000/04/20 Severity: low; untrusted local user can hog CPU Abstract ======== Untrusted local processes can hog cpu and kernel memory by tricking the kernel into running exclusively on their behalf, denying other processes the CPU. To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message