[17633] in bugtraq
Re: Denial of Service Vulnerability in Sun AnswerBook2
daemon@ATHENA.MIT.EDU (GOMBAS Gabor)
Mon Nov 13 17:33:43 2000
Mail-Followup-To: Dave Monnier <dmonnier@INDIANA.EDU>, bugtraq@securityfocus.com
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Message-Id: <20001113181046.E24897@valerie.inf.elte.hu>
Date: Mon, 13 Nov 2000 18:10:46 +0100
Reply-To: GOMBAS Gabor <gombasg@INF.ELTE.HU>
From: GOMBAS Gabor <gombasg@INF.ELTE.HU>
X-To: Dave Monnier <dmonnier@INDIANA.EDU>
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To: <Pine.LNX.4.30.0011131104240.22504-100000@bhodi.uwsg.indiana.edu>; from dmonnier@INDIANA.EDU on Mon,
Nov 13, 2000 at 11:07:25AM -0500
On Mon, Nov 13, 2000 at 11:07:25AM -0500, Dave Monnier wrote:
> When /tmp fills Solaris fails because /tmp is used for swap. If/when /tmp
> fills, swap space eventually also fills preventing additional procesees
> from being swapped. Eventually system memory will fill causing a failure
> of process spawning alltogether.
... unless you limit the amount of memory /tmp is allowed to use (see
mount_tmpfs(1M), 'size' parameter).
Gabor
--
Gabor Gombas Eotvos Lorand University
E-mail: gombasg@inf.elte.hu Hungary