On 8 June 2010 17:36, Pinnacle <[email protected]> wrote: > It would be nice if someone actually documented a hole, instead of all the > urban legends we hear. Outside the magic SVC, or a trusted person planting > malware in an APF library, I don't know of any "holes". Please share.
Well no one is going to step up and document a current hole that they may know about. Two holes I happen to know of that were fixed so long ago that it can't possibly matter now, are the whole GAM implementation, which happily accepted a user-supplied address and branched to it in supervisor state, and the ability of any user to run a line trace on a 37x5 without the possibility of control by the installation. These were fixed in the 1970s and 1980s respectively. Tony H. ---------------------------------------------------------------------- For IBM-MAIN subscribe / signoff / archive access instructions, send email to [email protected] with the message: GET IBM-MAIN INFO Search the archives at http://bama.ua.edu/archives/ibm-main.html

