[6571] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Linux 2.0.33 vulnerability: oversized packets

daemon@ATHENA.MIT.EDU (Krzysztof G. Baranowski)
Wed Apr 22 04:23:35 1998

Date: 	Tue, 21 Apr 1998 18:07:09 +0200
Reply-To: "Krzysztof G. Baranowski" <kgb@MANJAK.KNM.ORG.PL>
From: "Krzysztof G. Baranowski" <kgb@MANJAK.KNM.ORG.PL>
X-To:         Jon Lewis <jlewis@inorganic5.fdt.net>
To: BUGTRAQ@NETSPACE.ORG
In-Reply-To:  <Pine.LNX.3.95.980421012129.1098P-100000@tarkin.fdt.net>

While testing the million monkey theory, Jon Lewis wrote:
>Rather than use NETDEBUG to totally disable the printk, I think it might
>be more useful to put in some code to limit frequency of reporting...sort
>of like Solar Designer's secure-linux patch's security_alert() function
>does.
You might want to backport net_ratelimit() from 2.1.x kernel and
use it to guard all those pesky printk()s in ip_fragment.c, icmp.c
and yadda yadda...

Regards,
Kris
--
Krzysztof G. Baranowski - President of the Harmless Manyacs' Club
"Smith & Wesson - The original point and click interface..."
http://www.knm.org.pl/                 <prezes@manjak.knm.org.pl>

home help back first fref pref prev next nref lref last post