Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 31 May 2000 01:21:44 -0500 (CDT)
From:      Mike Silbersack <silby@silby.com>
To:        Bhishan Hemrajani <bhishan@fusion.unixfreak.org>
Cc:        Justin Stanford <jus@security.za.net>, Matt Heckaman <matt@ARPA.MAIL.NET>, Garrett Wollman <wollman@khavrinen.lcs.mit.edu>, FreeBSD-SECURITY <freebsd-security@FreeBSD.ORG>
Subject:   Re: Local FreeBSD, OpenBSD, NetBSD, DoS Vulnerability (fwd)
Message-ID:  <Pine.BSF.4.21.0005310118500.45571-100000@achilles.silby.com>
In-Reply-To: <200005310624.e4V6Our01501@fusion.unixfreak.org>

next in thread | previous in thread | raw e-mail | index | archive | help

In addition to looking at that, you might want to apply my backport of the
mbuf waiting code so the box doesn't panic; the code is solid, but as I
found another leak while testing, I haven't pushed to get it committed
yet.  (The leak occurs in 4 as well, so it's no reason to trust the patch
less.)

You can grab it from http://www.silby.com/patches/

EVERYONE running a 3.4 box is welcome to test the patch. <g>

Mike "Silby" Silbersack

On Tue, 30 May 2000, Bhishan Hemrajani wrote:

> Is there a patch for 3.4-STABLE users so that the limits can be applied?
> 
> I have been informed of one located at:
> http://people.freebsd.org/~green/sbsize2.patch
> 
> However, it is not functional at this moment.
> 
> Thank you.
> 
> --bhishan



To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.21.0005310118500.45571-100000>