mailing list archives
Re: Linux 2.0.33 vulnerability: oversized packets
From: kgb () MANJAK KNM ORG PL (Krzysztof G. Baranowski)
Date: Tue, 21 Apr 1998 18:07:09 +0200
While testing the million monkey theory, Jon Lewis wrote:
Rather than use NETDEBUG to totally disable the printk, I think it might
be more useful to put in some code to limit frequency of reporting...sort
of like Solar Designer's secure-linux patch's security_alert() function
You might want to backport net_ratelimit() from 2.1.x kernel and
use it to guard all those pesky printk()s in ip_fragment.c, icmp.c
and yadda yadda...
Krzysztof G. Baranowski - President of the Harmless Manyacs' Club
"Smith & Wesson - The original point and click interface..."
http://www.knm.org.pl/ <prezes () manjak knm org pl>
syndrop / modified version Ted Hickman [Network Admin] (Apr 15)
Re: APC UPS PowerChute PLUS exploit... Carl Dunham (Apr 21)