Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 8 Sep 2001 05:49:30 -0500
From:      Alfred Perlstein <bright@mu.org>
To:        "Andrew R. Reiter" <arr@watson.org>
Cc:        Kris Kennaway <kris@obsecurity.org>, security@freebsd.org
Subject:   Re: netbsd vulnerabilities
Message-ID:  <20010908054930.F2965@elvis.mu.org>
In-Reply-To: <Pine.NEB.3.96L.1010908063851.9148A-200000@fledge.watson.org>; from arr@watson.org on Sat, Sep 08, 2001 at 06:43:49AM -0400
References:  <20010907134427.A55600@xor.obsecurity.org> <Pine.NEB.3.96L.1010908063851.9148A-200000@fledge.watson.org>

next in thread | previous in thread | raw e-mail | index | archive | help
* Andrew R. Reiter <arr@watson.org> [010908 05:44] wrote:
> Hey,
> 
> The attached code fixes the semop bug which is specified in the recent
> NetBSD security announcement.  I'm not positive about hte naming scheme
> wanted by all in terms of:  size_t vs. unsigned int vs. unsigned.  I made
> it u_int b/c i saw in sysproto.h that there seemed to be more u_int's
> instead of size_t's :-)  Great logic.

Uh, why don't you just compare the int arg against 0, if it's less than
then just return EINVAL.

-Alfred

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20010908054930.F2965>