[17633] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Denial of Service Vulnerability in Sun AnswerBook2

daemon@ATHENA.MIT.EDU (GOMBAS Gabor)
Mon Nov 13 17:33:43 2000

Mail-Followup-To: Dave Monnier <dmonnier@INDIANA.EDU>, bugtraq@securityfocus.com
Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Message-Id:  <20001113181046.E24897@valerie.inf.elte.hu>
Date:         Mon, 13 Nov 2000 18:10:46 +0100
Reply-To: GOMBAS Gabor <gombasg@INF.ELTE.HU>
From: GOMBAS Gabor <gombasg@INF.ELTE.HU>
X-To:         Dave Monnier <dmonnier@INDIANA.EDU>
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  <Pine.LNX.4.30.0011131104240.22504-100000@bhodi.uwsg.indiana.edu>; from dmonnier@INDIANA.EDU on Mon,
              Nov 13, 2000 at 11:07:25AM -0500

On Mon, Nov 13, 2000 at 11:07:25AM -0500, Dave Monnier wrote:

> When /tmp fills Solaris fails because /tmp is used for swap.  If/when /tmp
> fills, swap space eventually also fills preventing additional procesees
> from being swapped. Eventually system memory will fill causing a failure
> of process spawning alltogether.

... unless you limit the amount of memory /tmp is allowed to use (see
mount_tmpfs(1M), 'size' parameter).

Gabor

--
Gabor Gombas                                       Eotvos Lorand University
E-mail: gombasg@inf.elte.hu                        Hungary

home help back first fref pref prev next nref lref last post