On 12/25/05, ober <[EMAIL PROTECTED]> wrote:
> Here is a patch, probably something want to test before using on
> a production box.
> http://www.linbsd.org/log_execve.38.patch
> It logs commands to syslog like this:
>
> EXECVE: uid:1000 fullpath:/bin/ls command:ls foo
> EXECVE: uid:1000 fullpath:/sbin/dmesg command:dmesg
> EXECVE: uid:1000 fullpath:/usr/bin/touch command:touch fff

accessing a user pointer from kernel is an easy denial of service attack.

Reply via email to