Date: Fri, 25 Oct 1996 17:37:20 -0600 (MDT) From: Marc Slemko <marcs@znep.com> To: Warner Losh <imp@village.org> Cc: security@FreeBSD.ORG Subject: Re: Vadim Kolontsov: BoS: Linux & BSD's lpr exploit Message-ID: <Pine.BSF.3.95.961025173358.27697C-100000@alive.ampr.ab.ca> In-Reply-To: <E0vGqC6-00023u-00@rover.village.org>
next in thread | previous in thread | raw e-mail | index | archive | help
On Fri, 25 Oct 1996, Warner Losh wrote: > Here's a new LPR threat. I've come up with a patch that I'd like > others on this list to vet. It is different than the one suggested by > the author. I think it is better, but haven't thought through all the > implications of it yet. > > Comments? I don't think it is worthwhile to bother with dynamic memory allocation for this. I think it is just as clean to simply exit, perhaps logging an error, if the string is too long.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.3.95.961025173358.27697C-100000>