Re: ISA slot detection on PCI systems?

Lionel Bouton (Lionel.Bouton@free.fr)
Wed, 02 Jan 2002 23:46:36 +0100


Eric S. Raymond wrote:

> [...]

>
> But this is not a bad reason. Allowing people to avoid running suid
> programs is a *good* reason.
>

Usually yes. But for a code that simply parses /dev/kmem content without
taking args...

Just took a quick look at dmidecode.c and auditing this code doesn't
seem out of reach.

What's the difference security-wise between running this code in kernel
space and in a suid prog? Avoiding loading libraries?

Frankly I don't see the point.

LB.

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/