From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 2034 invoked from network); 15 Aug 2000 01:05:20 -0000 Received: from sunsite.auc.dk (130.225.51.30) by ns1.primenet.com.au with SMTP; 15 Aug 2000 01:05:20 -0000 Received: (qmail 24094 invoked by alias); 15 Aug 2000 01:04:54 -0000 Mailing-List: contact zsh-workers-help@sunsite.auc.dk; run by ezmlm Precedence: bulk X-No-Archive: yes X-Seq: 12629 Received: (qmail 24087 invoked from network); 15 Aug 2000 01:04:53 -0000 Date: Mon, 14 Aug 2000 18:04:34 -0700 (PDT) From: Bart Schaefer Sender: schaefer@aztec.zanshin.com Reply-To: Bart Schaefer To: Jonel Rienton cc: zsh-workers@sunsite.auc.dk Subject: RE: buffer overflow on zsh-3.1.9 In-Reply-To: Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII On Mon, 14 Aug 2000, Jonel Rienton wrote: > doesn't this constitute for a malicious user to bring down your system > in a multi environment box? If you have to defend your box against the users that have shell access, you're already in much deeper trouble than anything a change to zsh would help you with. > This email is sent by qmail-1.03 on a > FreeBSD 4.1-STABLE box Incidentally, on my desktop linux box at work (a 200MHz Pentium II with 128Mb RAM, getting rather old now) I have to hit Alt-9 seven times to even slow the shell down noticeably when I hit the next key, and it still succeeded in inserting 'a' 9999999 times. I don't recall for certain, but I believe FreeBSD may be one of the platforms that has pathologically bad realloc() behavior when repeatedly expanding the same buffer. Try configuring with --enable-zsh-mem to see whether the behavior improves.