On 10/28/2010 04:55 PM, Dave Hylands wrote:
> Hi Rajat,
> 
> On Thu, Oct 28, 2010 at 2:41 AM, Rajat Sharma <[email protected]> wrote:
>>> This is non-sense. It is a feature. I need it when working on my ARM
>>> based system and trying to debug some hardware that needs writing to
>>> specific memory locations.
>>
>> If something is assiting you in debug, that does not make it fall into a
>> feature. And saying that it is a feature, it does not claim that it is not
>> vulnerable to attacks. If you really want to use this for debugging, you may
>> do it on a development system which you can not risk for security attacks.
>> For a production system or server, you may not want to use it for any
>> debugging and it may be lying there without any purpose for its security
>> vulnerability. If it is a configurable options, its good to compile the
>> kernel for your debugging purpose.
>>
>> Look at the patch below, at least there are people who assume that it is
>> vulnerability:
>>
>> http://kerneltrap.org/mailarchive/linux-kernel/2008/2/11/809424
>>
>> It is almost like saying that apple can't get rotten because you like the
>> taste.
> 
> I guess the ability to run any code at all must be a security hole then...
> 
> What this all boils down to, is what's your definition of a security
> hole? This particular thing might fit into some weird class of
> security holes (things to protect the system from the root user). I'm
> much more interested in preventing people from being root in the first
> place (much easier to fix in an OS like linux).

Me too,

besides, some people think a rotten (should I say fermented) grape is
better than a fresh one anyways.

Wouter


--
To unsubscribe from this list: send an email with
"unsubscribe kernelnewbies" to [email protected]
Please read the FAQ at http://kernelnewbies.org/FAQ

Reply via email to