Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 17 Aug 1999 23:18:00 -0600
From:      Brett Glass <brett@lariat.org>
To:        Matthew Dillon <dillon@apollo.backplane.com>
Cc:        Mike Tancsa <mike@sentex.net>, freebsd-security@FreeBSD.ORG
Subject:   Re: Any work around for this FreeBSD bug/DoS  ?
Message-ID:  <4.2.0.58.19990817231641.04640280@localhost>
In-Reply-To: <199908180031.RAA40827@apollo.backplane.com>
References:  <4.1.19990816203409.05989960@granite.sentex.ca> <4.1.19990816213403.05a3b540@granite.sentex.ca> <4.2.0.58.19990817182156.0463ecd0@localhost>

next in thread | previous in thread | raw e-mail | index | archive | help
Well, who's a kernel memory allocation expert? I would dive on this
one, but I'd be coming in cold; I've never messed with that part
of the kernel at all. All I know about mbuf allocation is what's
in McKusick.

--Brett

At 05:31 PM 8/17/99 -0700, Matthew Dillon wrote:
>:
>:Perhaps. But this is no excuse for leaving such a serious hole open! No 
>:unprivileged user should be able to crash the system under any circumstances.
>:Especially not this easily.
>:
>:--Brett
>
>     I agree, but being a freeware project someone has to decide to fix it.
>     I've got my hands full with VM (and not having commit privs already makes
>     that difficult enough).
>
>                                         -Matt
>                                         Matthew Dillon 
>                                         <dillon@backplane.com>



To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?4.2.0.58.19990817231641.04640280>