Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id ; Tue, 13 Aug 2002 23:54:11 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id ; Tue, 13 Aug 2002 23:54:10 -0400 Received: from to-velocet.redhat.com ([216.138.202.10]:43768 "EHLO touchme.toronto.redhat.com") by vger.kernel.org with ESMTP id ; Tue, 13 Aug 2002 23:54:10 -0400 Date: Tue, 13 Aug 2002 23:58:03 -0400 From: Benjamin LaHaise To: Andrew Morton Cc: Linus Torvalds , "H. Peter Anvin" , lkml Subject: Re: [patch] printk from userspace Message-ID: <20020813235803.A15947@redhat.com> References: <3D59CBFA.9CFC9FEE@zip.com.au> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline User-Agent: Mutt/1.2.5.1i In-Reply-To: <3D59CBFA.9CFC9FEE@zip.com.au>; from akpm@zip.com.au on Tue, Aug 13, 2002 at 08:18:18PM -0700 Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 557 Lines: 14 On Tue, Aug 13, 2002 at 08:18:18PM -0700, Andrew Morton wrote: > > The patch allows userspace to issue printk's, via sys_syslog(): This is an incredibly bad idea. It has security hole written all over it. Any user can now spam the kernel's log ringbuffer and overrun potentially important messages. -ben - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/