Date: Wed, 31 May 2000 01:21:44 -0500 (CDT) From: Mike Silbersack <silby@silby.com> To: Bhishan Hemrajani <bhishan@fusion.unixfreak.org> Cc: Justin Stanford <jus@security.za.net>, Matt Heckaman <matt@ARPA.MAIL.NET>, Garrett Wollman <wollman@khavrinen.lcs.mit.edu>, FreeBSD-SECURITY <freebsd-security@FreeBSD.ORG> Subject: Re: Local FreeBSD, OpenBSD, NetBSD, DoS Vulnerability (fwd) Message-ID: <Pine.BSF.4.21.0005310118500.45571-100000@achilles.silby.com> In-Reply-To: <200005310624.e4V6Our01501@fusion.unixfreak.org>
next in thread | previous in thread | raw e-mail | index | archive | help
In addition to looking at that, you might want to apply my backport of the mbuf waiting code so the box doesn't panic; the code is solid, but as I found another leak while testing, I haven't pushed to get it committed yet. (The leak occurs in 4 as well, so it's no reason to trust the patch less.) You can grab it from http://www.silby.com/patches/ EVERYONE running a 3.4 box is welcome to test the patch. <g> Mike "Silby" Silbersack On Tue, 30 May 2000, Bhishan Hemrajani wrote: > Is there a patch for 3.4-STABLE users so that the limits can be applied? > > I have been informed of one located at: > http://people.freebsd.org/~green/sbsize2.patch > > However, it is not functional at this moment. > > Thank you. > > --bhishan To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.21.0005310118500.45571-100000>
