| To: | H D Moore <sflist@xxxxxxxxxxxxxxxxxx> |
|---|---|
| Subject: | Re: IRIX XFS filesystem denial of service attack |
| From: | Eric Sandeen <sandeen@xxxxxxx> |
| Date: | 16 Apr 2002 16:40:00 -0500 |
| Cc: | agent99@xxxxxxx, linux-xfs@xxxxxxxxxxx, bugtraq@xxxxxxxxxxxxxxxxx |
| Delivered-to: | mailing list bugtraq@securityfocus.com |
| Delivered-to: | moderator for bugtraq@securityfocus.com |
| In-reply-to: | <200204151832.38497.sflist@digitaloffense.net> |
| Mailing-list: | contact bugtraq-help@securityfocus.com; run by ezmlm |
| Priority: | urgent |
| References: | <10204151449.ZM268355@einstein.csd.sgi.com> <200204151832.38497.sflist@digitaloffense.net> |
| Sender: | linux-xfs-bounce@xxxxxxxxxxx |
hi HD - I don't believe that Linux is affected. I've been told that the Linux I/O path was written specifically to avoid this problem, and I have run some test cases from our original bug report, and did not see the described behavior. I'll look a bit more and reply when I know for sure. -Eric On Mon, 2002-04-15 at 18:32, H D Moore wrote: > Does this vulnerability affect the Linux XFS port? The XFS page has no > information about this or whether there is a fix available: -- Eric Sandeen XFS for Linux http://oss.sgi.com/projects/xfs sandeen@xxxxxxx SGI, Inc. |
| <Prev in Thread] | Current Thread | [Next in Thread> |
|---|---|---|
| ||
| Previous by Date: | Re: Kernel 2.4.20 and XFS 1.2pre3, Eric Sandeen |
|---|---|
| Next by Date: | Re: IRIX XFS filesystem denial of service attack, H D Moore |
| Previous by Thread: | Re: IRIX XFS filesystem denial of service attack, H D Moore |
| Next by Thread: | FW: xfs crashes; 2.4.19; both times started with xfsdump level 0;, LA Walsh |
| Indexes: | [Date] [Thread] [Top] [All Lists] |