Home page logo

bugtraq logo Bugtraq mailing list archives

Re: Linux 2.0.33 vulnerability: oversized packets
From: kgb () MANJAK KNM ORG PL (Krzysztof G. Baranowski)
Date: Tue, 21 Apr 1998 18:07:09 +0200

While testing the million monkey theory, Jon Lewis wrote:
Rather than use NETDEBUG to totally disable the printk, I think it might
be more useful to put in some code to limit frequency of reporting...sort
of like Solar Designer's secure-linux patch's security_alert() function
You might want to backport net_ratelimit() from 2.1.x kernel and
use it to guard all those pesky printk()s in ip_fragment.c, icmp.c
and yadda yadda...

Krzysztof G. Baranowski - President of the Harmless Manyacs' Club
"Smith & Wesson - The original point and click interface..."
http://www.knm.org.pl/                 <prezes () manjak knm org pl>

  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]