From owner-freebsd-security Tue May 30 23:21:51 2000 Delivered-To: freebsd-security@freebsd.org Received: from silby.com (cb34181-a.mdsn1.wi.home.com [24.14.173.39]) by hub.freebsd.org (Postfix) with SMTP id 2F4C037BDA6 for ; Tue, 30 May 2000 23:21:45 -0700 (PDT) (envelope-from silby@silby.com) Received: (qmail 45620 invoked by uid 1000); 31 May 2000 06:21:44 -0000 Received: from localhost (sendmail-bs@127.0.0.1) by localhost with SMTP; 31 May 2000 06:21:44 -0000 Date: Wed, 31 May 2000 01:21:44 -0500 (CDT) From: Mike Silbersack To: Bhishan Hemrajani Cc: Justin Stanford , Matt Heckaman , Garrett Wollman , FreeBSD-SECURITY Subject: Re: Local FreeBSD, OpenBSD, NetBSD, DoS Vulnerability (fwd) In-Reply-To: <200005310624.e4V6Our01501@fusion.unixfreak.org> Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org In addition to looking at that, you might want to apply my backport of the mbuf waiting code so the box doesn't panic; the code is solid, but as I found another leak while testing, I haven't pushed to get it committed yet. (The leak occurs in 4 as well, so it's no reason to trust the patch less.) You can grab it from http://www.silby.com/patches/ EVERYONE running a 3.4 box is welcome to test the patch. Mike "Silby" Silbersack On Tue, 30 May 2000, Bhishan Hemrajani wrote: > Is there a patch for 3.4-STABLE users so that the limits can be applied? > > I have been informed of one located at: > http://people.freebsd.org/~green/sbsize2.patch > > However, it is not functional at this moment. > > Thank you. > > --bhishan To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message