Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 9 Sep 2001 03:14:37 +1000 (EST)
From:      Bruce Evans <bde@zeta.org.au>
To:        Alfred Perlstein <bright@mu.org>
Cc:        "Andrew R. Reiter" <arr@watson.org>, Kris Kennaway <kris@obsecurity.org>, <security@FreeBSD.ORG>
Subject:   Re: netbsd vulnerabilities
Message-ID:  <20010909030758.B48694-100000@alphplex.bde.org>
In-Reply-To: <20010908054930.F2965@elvis.mu.org>

next in thread | previous in thread | raw e-mail | index | archive | help

On Sat, 8 Sep 2001, Alfred Perlstein wrote:

> * Andrew R. Reiter <arr@watson.org> [010908 05:44] wrote:
> > Hey,
> >
> > The attached code fixes the semop bug which is specified in the recent
> > NetBSD security announcement.  I'm not positive about hte naming scheme
> > wanted by all in terms of:  size_t vs. unsigned int vs. unsigned.  I made
> > it u_int b/c i saw in sysproto.h that there seemed to be more u_int's
> > instead of size_t's :-)  Great logic.
>
> Uh, why don't you just compare the int arg against 0, if it's less than
> then just return EINVAL.

The API apparently specified that it is unsigned (I checked the Linux
version).  And don't use the hack of type punning the unsigned to int
(this part already happens) and checking for the int being less than 0
(this check is missing).  We already use the hack of type punning an
int to an unsigned in too many places (readv, writev, ...).

Bruce


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20010909030758.B48694-100000>