Eric S. Raymond wrote:
> [...]
>
> But this is not a bad reason. Allowing people to avoid running suid
> programs is a *good* reason.
>
Usually yes. But for a code that simply parses /dev/kmem content without
taking args...
Just took a quick look at dmidecode.c and auditing this code doesn't
seem out of reach.
What's the difference security-wise between running this code in kernel
space and in a suid prog? Avoiding loading libraries?
Frankly I don't see the point.
LB.
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
This archive was generated by hypermail 2b29 : Mon Jan 07 2002 - 21:00:18 EST