From owner-freebsd-security Tue Aug 17 17:32:26 1999 Delivered-To: freebsd-security@freebsd.org Received: from apollo.backplane.com (apollo.backplane.com [209.157.86.2]) by hub.freebsd.org (Postfix) with ESMTP id C8EF3156FB for ; Tue, 17 Aug 1999 17:32:20 -0700 (PDT) (envelope-from dillon@apollo.backplane.com) Received: (from dillon@localhost) by apollo.backplane.com (8.9.3/8.9.1) id RAA40827; Tue, 17 Aug 1999 17:31:18 -0700 (PDT) (envelope-from dillon) Date: Tue, 17 Aug 1999 17:31:18 -0700 (PDT) From: Matthew Dillon Message-Id: <199908180031.RAA40827@apollo.backplane.com> To: Brett Glass Cc: Mike Tancsa , freebsd-security@FreeBSD.ORG Subject: Re: Any work around for this FreeBSD bug/DoS ? References: <4.1.19990816203409.05989960@granite.sentex.ca> <4.1.19990816213403.05a3b540@granite.sentex.ca> <4.2.0.58.19990817182156.0463ecd0@localhost> Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org : :Perhaps. But this is no excuse for leaving such a serious hole open! No :unprivileged user should be able to crash the system under any circumstances. :Especially not this easily. : :--Brett I agree, but being a freeware project someone has to decide to fix it. I've got my hands full with VM (and not having commit privs already makes that difficult enough). -Matt Matthew Dillon To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message