Date: Tue, 30 May 2000 12:59:48 +1000 (EST) From: Bruce Evans <bde@zeta.org.au> To: Mike Silbersack <silby@silby.com> Cc: security@FreeBSD.ORG Subject: Re: NetBSD Security Advisory 2000-005 (fwd) Message-ID: <Pine.BSF.4.21.0005301256450.3261-100000@besplex.bde.org> In-Reply-To: <Pine.BSF.4.21.0005291733510.41434-100000@achilles.silby.com>
next in thread | previous in thread | raw e-mail | index | archive | help
On Mon, 29 May 2000, Mike Silbersack wrote: > Out of curiosity; does anyone know if this vaguely defined problem affects > freebsd? > > Mike "Silby" Silbersack > > ---------- Forwarded message ---------- > Date: Sun, 28 May 2000 23:47:24 -0400 > From: NetBSD Security Officer <security-officer@NETBSD.ORG> > To: BUGTRAQ@SECURITYFOCUS.COM > Subject: NetBSD Security Advisory 2000-005 > > -----BEGIN PGP SIGNED MESSAGE----- > > NetBSD Security Advisory 2000-005 > ================================= > > Topic: Local "cpu-hog" denial of service > Version: all versions prior to 2000/04/20 > Severity: low; untrusted local user can hog CPU I fixed at least some of the cpu time hogs (mainly /dev/zero) in Feb. 1999. I don't remember any fixes for the kernel space hogs (large malloc()s by ktrace). Bruce To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.21.0005301256450.3261-100000>