Date: Sat, 8 Sep 2001 05:49:30 -0500 From: Alfred Perlstein <bright@mu.org> To: "Andrew R. Reiter" <arr@watson.org> Cc: Kris Kennaway <kris@obsecurity.org>, security@freebsd.org Subject: Re: netbsd vulnerabilities Message-ID: <20010908054930.F2965@elvis.mu.org> In-Reply-To: <Pine.NEB.3.96L.1010908063851.9148A-200000@fledge.watson.org>; from arr@watson.org on Sat, Sep 08, 2001 at 06:43:49AM -0400 References: <20010907134427.A55600@xor.obsecurity.org> <Pine.NEB.3.96L.1010908063851.9148A-200000@fledge.watson.org>
next in thread | previous in thread | raw e-mail | index | archive | help
* Andrew R. Reiter <arr@watson.org> [010908 05:44] wrote: > Hey, > > The attached code fixes the semop bug which is specified in the recent > NetBSD security announcement. I'm not positive about hte naming scheme > wanted by all in terms of: size_t vs. unsigned int vs. unsigned. I made > it u_int b/c i saw in sysproto.h that there seemed to be more u_int's > instead of size_t's :-) Great logic. Uh, why don't you just compare the int arg against 0, if it's less than then just return EINVAL. -Alfred To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20010908054930.F2965>