-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 On 2016-03-02 15:58, Anton Aylward wrote:
Hmm: if syslog could send to the ring buffer that would be an attack surface; a rouge/hijacked network device could send syslog messages with buffer overflow to the kernel of a host. If that were possible we have a very serious structural flaw!
logger -p kern.info -t test "test message" (not exactly what it would seem, though) :-) - -- Cheers / Saludos, Carlos E. R. (from 13.1 x86_64 "Bottle" (Minas Tirith)) -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.22 (GNU/Linux) iF4EAREIAAYFAlbXBGYACgkQja8UbcUWM1yJwwD+Nm6CbC1iW5VhGifzrubIUFmd 7NpdgDWZQAlcT0giYwkBAIYjRphAWZ3Y4RJnO34N2x295N0FMZ8stPk/dRjVz6Fx =yGMX -----END PGP SIGNATURE----- -- To unsubscribe, e-mail: opensuse+unsubscribe@opensuse.org To contact the owner, e-mail: opensuse+owner@opensuse.org