Re: Linux 2.0.33 vulnerability: oversized packets

From: Krzysztof G. Baranowski (kgbat_private)
Date: Tue Apr 21 1998 - 09:07:09 PDT

  • Next message: Czako Krisztian: "Re: smbmount problem?"

    While testing the million monkey theory, Jon Lewis wrote:
    >Rather than use NETDEBUG to totally disable the printk, I think it might
    >be more useful to put in some code to limit frequency of reporting...sort
    >of like Solar Designer's secure-linux patch's security_alert() function
    >does.
    You might want to backport net_ratelimit() from 2.1.x kernel and
    use it to guard all those pesky printk()s in ip_fragment.c, icmp.c
    and yadda yadda...
    
    Regards,
    Kris
    --
    Krzysztof G. Baranowski - President of the Harmless Manyacs' Club
    "Smith & Wesson - The original point and click interface..."
    http://www.knm.org.pl/                 <prezesat_private>
    



    This archive was generated by hypermail 2b30 : Fri Apr 13 2001 - 13:50:28 PDT