Re: /dev/mem

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 10/27/2010 06:54 PM, Rajat Sharma wrote:
> In any case, no one can claim its not security hole, it is definitely,
> but only restricted to privileged processes. Any of the vulnerable
> process can make life easy for hackers. Also no one can build 100%
> secure system.

This is non-sense. It is a feature. I need it when working on my ARM
based system and trying to debug some hardware that needs writing to
specific memory locations.

If you want to call this a security hole then I think you should
consider how the balance between usability and security works. If a
system needs to be 100% secure it should be powered off, with cables
physically removed from any power outlet and stored in the vault of the
federal reserve or somesuch.

Here is a message about restricting the access through /dev/mem on x86,
check your kernel config to see how well protected you are:
http://lwn.net/Articles/267427/

But here I am claiming that it is a feature not a security hole.

;-)

Wouter

--
To unsubscribe from this list: send an email with
"unsubscribe kernelnewbies" to ecartis@xxxxxxxxxxxx
Please read the FAQ at http://kernelnewbies.org/FAQ



[Index of Archives]     [Newbies FAQ]     [Linux Kernel Mentors]     [Linux Kernel Development]     [IETF Annouce]     [Git]     [Networking]     [Security]     [Bugtraq]     [Yosemite]     [MIPS Linux]     [ARM Linux]     [Linux RAID]     [Linux SCSI]     [Linux ACPI]
  Powered by Linux