Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id ; Mon, 23 Jul 2001 18:24:50 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id ; Mon, 23 Jul 2001 18:24:40 -0400 Received: from ferret.lmh.ox.ac.uk ([163.1.18.131]:58378 "HELO ferret.lmh.ox.ac.uk") by vger.kernel.org with SMTP id ; Mon, 23 Jul 2001 18:24:25 -0400 Date: Mon, 23 Jul 2001 23:24:19 +0100 (BST) From: Chris Evans X-X-Sender: To: cc: Subject: Minor net/core/sock.c security issue? Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Original-Recipient: rfc822;linux-kernel-outgoing Hi, May be nothing, but it looks like SO_*BUF may have signedness issues (have these been picked up by the Stanford tools and fixed in recent 2.4.x?) int val; ... case SO_SNDBUF: if (val > sysctl_wmem_max) val = sysctl_wmem_max; sk->sndbuf = max(val*2,2048); If val is negative, then sk->sndbuf ends up negative. This is because the arguments to max are passed as _unsigned_ ints. SO_RCVBUF has similar issues. Maybe a nasty local user could use this to chew up memory? Cheers Chris - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/