Re: Command-line anomoly V2.3.35

From: Richard Zidlicky (Richard.Zidlicky@stud.informatik.uni-erlangen.de)
Date: Thu Jan 06 2000 - 14:22:17 EST


> > IMHO, programs that depend on overwriting argv members without regard to
> > checking for buffer overflows are broken, especially from a portability
> > standpoint. The space for the args is allocated on the user stack at
> > exec time, and the limits are stored in the mm struct for the task (this
> > is from binfmt_elf.c). If you exceed that space you will spill into the
> > space for the environment variables.
> >
>
> Yes, but who checks environment variables anyway? <grin>

did you ever link your progs against (g)libc ? <g>

Bye
Richard

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.rutgers.edu
Please read the FAQ at http://www.tux.org/lkml/



This archive was generated by hypermail 2b29 : Fri Jan 07 2000 - 21:00:07 EST