Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 25 Oct 1996 17:37:20 -0600 (MDT)
From:      Marc Slemko <marcs@znep.com>
To:        Warner Losh <imp@village.org>
Cc:        security@FreeBSD.ORG
Subject:   Re: Vadim Kolontsov: BoS:      Linux & BSD's lpr exploit
Message-ID:  <Pine.BSF.3.95.961025173358.27697C-100000@alive.ampr.ab.ca>
In-Reply-To: <E0vGqC6-00023u-00@rover.village.org>

next in thread | previous in thread | raw e-mail | index | archive | help
On Fri, 25 Oct 1996, Warner Losh wrote:

> Here's a new LPR threat.  I've come up with a patch that I'd like
> others on this list to vet.  It is different than the one suggested by
> the author.  I think it is better, but haven't thought through all the
> implications of it yet.
> 
> Comments?

I don't think it is worthwhile to bother with dynamic memory allocation
for this.  I think it is just as clean to simply exit, perhaps logging an
error, if the string is too long.





Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.3.95.961025173358.27697C-100000>