[11432] in bugtraq
Re: Symmetric Multiprocessing (SMP) Vulnerbility in BSDi 4.0.1
daemon@ATHENA.MIT.EDU (=?ISO-9550?B?o8C359TCv82jwA==?=)
Thu Aug 19 18:15:46 1999
Mime-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Message-Id: <Pine.BSF.4.10.9908181129550.25560-100000@bluerose.windmoon.nu>
Date: Wed, 18 Aug 1999 11:32:00 -0700
Reply-To: =?ISO-9550?B?o8C359TCv82jwA==?= <fengyue@BLUEROSE.WINDMOON.NU>
From: =?ISO-9550?B?o8C359TCv82jwA==?= <fengyue@BLUEROSE.WINDMOON.NU>
X-To: Ben Lull <blull@PSN.NET>
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To: <Pine.BSI.4.10.9908170253560.19291-100000@saturn.psn.net>
On Tue, 17 Aug 1999, Ben Lull wrote:
> Description:
>
> A vulnerbility exists in BSDi 4.0.1 Symmetric Multiprocessing
> (SMP). During high CPU usage it is possible to cause BSDi 4.0.1
> (possibly others but untested) with all current patches to stop
FreeBSD 3.2 SMP seems to be fine. The machine that I used to test is a
dual P-III with ASUS motherboard.