Date: Thu, 15 Jul 1999 15:53:11 -0700 (PDT) From: Matthew Dillon <dillon@apollo.backplane.com> To: Paulo Fragoso <paulo@nlink.com.br> Cc: freebsd-security@FreeBSD.ORG Subject: Re: FreeBSD exploit? Message-ID: <199907152253.PAA13514@apollo.backplane.com> References: <Pine.BSF.3.96.990715181051.8607A-100000@mirage.nlink.com.br>
next in thread | previous in thread | raw e-mail | index | archive | help
:Hi, : :Has anyone ever read this article: : :http://www.securityfocus.com/level2/bottom.html?go=vulnerabilities&id=526 : :all version of freebsd has this problem!!! : :Paulo. Yes, but it isn't an exploit, it's a denial of service attack ( and there is a difference ). Yes, it appears to be a real bug. I can set my datasize limit to 16m and then mmap() a 64m file MAP_PRIVATE and touch all the pages without getting a fault. We could conceivably fix it by adding a new resource limit to the system for privately mmap'd space. But I think, ultimately, the only way to fix it would be to add a per-user VM quota resource that accounts for it properly. -Matt Matthew Dillon <dillon@backplane.com> To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199907152253.PAA13514>