Bugtraq mailing list archives

Re: Linux 2.0.33 vulnerability: oversized packets


From: kgb () MANJAK KNM ORG PL (Krzysztof G. Baranowski)
Date: Tue, 21 Apr 1998 18:07:09 +0200


While testing the million monkey theory, Jon Lewis wrote:
Rather than use NETDEBUG to totally disable the printk, I think it might
be more useful to put in some code to limit frequency of reporting...sort
of like Solar Designer's secure-linux patch's security_alert() function
does.
You might want to backport net_ratelimit() from 2.1.x kernel and
use it to guard all those pesky printk()s in ip_fragment.c, icmp.c
and yadda yadda...

Regards,
Kris
--
Krzysztof G. Baranowski - President of the Harmless Manyacs' Club
"Smith & Wesson - The original point and click interface..."
http://www.knm.org.pl/                 <prezes () manjak knm org pl>



Current thread: