Date: Mon, 19 Feb 2001 11:34:40 -0800 (PST) From: mm@omnix.net To: freebsd-gnats-submit@FreeBSD.org Subject: kern/25206: Kernel Panic Message-ID: <200102191934.f1JJYew70666@freefall.freebsd.org>
next in thread | raw e-mail | index | archive | help
>Number: 25206
>Category: kern
>Synopsis: Kernel Panic
>Confidential: no
>Severity: critical
>Priority: medium
>Responsible: freebsd-bugs
>State: open
>Quarter:
>Keywords:
>Date-Required:
>Class: sw-bug
>Submitter-Id: current-users
>Arrival-Date: Mon Feb 19 11:40:01 PST 2001
>Closed-Date:
>Last-Modified:
>Originator: Meadele Mathieu
>Release: FreeBSD-4.2-Stable
>Organization:
-
>Environment:
FreeBSD PAF 4.2-RELEASE FreeBSD 4.2-RELEASE #9:
Wed Feb 7 22:01:11 CET 2001
root@PAF:/usr/src/sys/compile/PAF i386
>Description:
By default, /dev/ttyp* have perm set to 0666, until someone remotely
log in, in this case the user's ttyp is chmod'ed to 0600 and chown'ed
to this user.
if noone is remotely logged in, the next ttyp associated with telnet or
ssh for example will be ttyp1.
My box crashed if a local user open the next /dev/ttyp normally used
for remote connection:
luser@PAF$ w
8:37PM up 32 mins, 2 users, load averages: 0.41, 0.17, 0.14
USER TTY FROM LOGIN@ IDLE WHAT
luser v0 - 8:08PM - w
luser@PAF$ tail -f /dev/ttyp1
now ruser is going to connect to my box:
ruser@NOWHERE$ telnet PAF
Connection closed by foreign host.
luser@PAF$
Fatal trap 12 = Page Fault while in kernel mode
Fault virtual address = 0x88
Fault code = supervisor read, page not present
Instruction pointer = 0x8:0xc0167c1b
Stack pointer = 0x10:0xd11f2ecc
Frame pointer = 0x10:0xd11f2ed0
Code segment = base 0x0, limit 0xfffff, type 0x1b
= DLP 0, pres 1, def32 1, gran 1
Processor eflags = interrupt enabled, resume, IO PL=0
Current process = 257(tail)
Interrupt mask = net tty bio cam
trap number = 12
panic = page fault
syncing disk: 13 13 13 [...] 13 13
giving up on 13 buffers
uptime 32m36s
Automatic reboot in 15 seconds...
Have you this problem on your box ?
It seems that a malicious local user can easily cause a denial
of service like this.
>How-To-Repeat:
luser@A$ tail -f /dev/ttypx (where ttypx is the next ttyp associated
with a remote connection)
ruser@B$ telnet A
-->machine A crashes
>Fix:
>Release-Note:
>Audit-Trail:
>Unformatted:
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-bugs" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200102191934.f1JJYew70666>
