> Yes.  As on Linux and other systems, there's no default restriction(*)
> for the number of processes of an unprivileged user.

> This is not something controlled by Cygwin, rather by the OS.  Cygwin
> provides the POSIX calls getrlimit/setrlimit, but obviously those have
> to be implemented in terms of OS functions or faked.
> 
> The only implemented limits are RLIMIT_AS, RLIMIT_CORE, RLIMIT_NOFILE
> and RLIMIT_STACK, and only RLIMIT_AS is actually calling into the OS to
> install a restriction.

Thank you, Corinna, for all the explanations!

So basically, Windows is inherently susceptible for the fork bomb attack, and 
there's nothing Cygwin-specific in this vulnerability, or something that Cygwin 
can add to make it worse than it already is.

Anton Lavrentiev
Contractor NIH/NLM/NCBI

P.S. As a "regular" Linux user, I do have the process limit in my environment 
set as 2048, and I think that's effectively protects the system from the 
runaway situation.  Also, it looks like I have never hit this limit in the real 
use-case scenarios so it is quite adequate not to interfere with the day-to-day 
work.

-- 
Problem reports:      https://cygwin.com/problems.html
FAQ:                  https://cygwin.com/faq/
Documentation:        https://cygwin.com/docs.html
Unsubscribe info:     https://cygwin.com/ml/#unsubscribe-simple

Reply via email to