From owner-freebsd-security Mon May 29 20: 0:12 2000 Delivered-To: freebsd-security@freebsd.org Received: from mailman.zeta.org.au (mailman.zeta.org.au [203.26.10.16]) by hub.freebsd.org (Postfix) with ESMTP id D81DD37B59F for ; Mon, 29 May 2000 20:00:06 -0700 (PDT) (envelope-from bde@zeta.org.au) Received: from bde.zeta.org.au (bde.zeta.org.au [203.2.228.102]) by mailman.zeta.org.au (8.8.7/8.8.7) with ESMTP id MAA30908; Tue, 30 May 2000 12:59:52 +1000 Date: Tue, 30 May 2000 12:59:48 +1000 (EST) From: Bruce Evans X-Sender: bde@besplex.bde.org To: Mike Silbersack Cc: security@FreeBSD.ORG Subject: Re: NetBSD Security Advisory 2000-005 (fwd) In-Reply-To: Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org On Mon, 29 May 2000, Mike Silbersack wrote: > Out of curiosity; does anyone know if this vaguely defined problem affects > freebsd? > > Mike "Silby" Silbersack > > ---------- Forwarded message ---------- > Date: Sun, 28 May 2000 23:47:24 -0400 > From: NetBSD Security Officer > To: BUGTRAQ@SECURITYFOCUS.COM > Subject: NetBSD Security Advisory 2000-005 > > -----BEGIN PGP SIGNED MESSAGE----- > > NetBSD Security Advisory 2000-005 > ================================= > > Topic: Local "cpu-hog" denial of service > Version: all versions prior to 2000/04/20 > Severity: low; untrusted local user can hog CPU I fixed at least some of the cpu time hogs (mainly /dev/zero) in Feb. 1999. I don't remember any fixes for the kernel space hogs (large malloc()s by ktrace). Bruce To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message