Re: ISA slot detection on PCI systems?

From: Lionel Bouton (Lionel.Bouton@free.fr)
Date: Wed Jan 02 2002 - 17:46:36 EST


Eric S. Raymond wrote:

> [...]

>
> But this is not a bad reason. Allowing people to avoid running suid
> programs is a *good* reason.
>

Usually yes. But for a code that simply parses /dev/kmem content without
taking args...

Just took a quick look at dmidecode.c and auditing this code doesn't
seem out of reach.

What's the difference security-wise between running this code in kernel
space and in a suid prog? Avoiding loading libraries?

Frankly I don't see the point.

LB.

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/



This archive was generated by hypermail 2b29 : Mon Jan 07 2002 - 21:00:18 EST