> > IMHO, programs that depend on overwriting argv members without regard to
> > checking for buffer overflows are broken, especially from a portability
> > standpoint. The space for the args is allocated on the user stack at
> > exec time, and the limits are stored in the mm struct for the task (this
> > is from binfmt_elf.c). If you exceed that space you will spill into the
> > space for the environment variables.
> >
>
> Yes, but who checks environment variables anyway? <grin>
>
You may not care about the environment, but then you ought to worry
about what comes next. Unusual, but a program may run with no
environment or something really short.
Even the case of IP-adresses could get longish now that IP v6 is coming.
Helge Hafting
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.rutgers.edu
Please read the FAQ at http://www.tux.org/lkml/
This archive was generated by hypermail 2b29 : Sat Jan 15 2000 - 21:00:16 EST