Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 30 May 2000 12:59:48 +1000 (EST)
From:      Bruce Evans <bde@zeta.org.au>
To:        Mike Silbersack <silby@silby.com>
Cc:        security@FreeBSD.ORG
Subject:   Re: NetBSD Security Advisory 2000-005 (fwd)
Message-ID:  <Pine.BSF.4.21.0005301256450.3261-100000@besplex.bde.org>
In-Reply-To: <Pine.BSF.4.21.0005291733510.41434-100000@achilles.silby.com>

next in thread | previous in thread | raw e-mail | index | archive | help
On Mon, 29 May 2000, Mike Silbersack wrote:

> Out of curiosity; does anyone know if this vaguely defined problem affects
> freebsd?  
> 
> Mike "Silby" Silbersack
> 
> ---------- Forwarded message ----------
> Date: Sun, 28 May 2000 23:47:24 -0400
> From: NetBSD Security Officer <security-officer@NETBSD.ORG>
> To: BUGTRAQ@SECURITYFOCUS.COM
> Subject: NetBSD Security Advisory 2000-005
> 
> -----BEGIN PGP SIGNED MESSAGE-----
> 
>                  NetBSD Security Advisory 2000-005
>                  =================================
> 
> Topic:		Local "cpu-hog" denial of service
> Version:	all versions prior to 2000/04/20
> Severity:	low; untrusted local user can hog CPU

I fixed at least some of the cpu time hogs (mainly /dev/zero) in Feb. 1999.
I don't remember any fixes for the kernel space hogs (large malloc()s
by ktrace).

Bruce



To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.21.0005301256450.3261-100000>