home *** CD-ROM | disk | FTP | other *** search
- Newsgroups: comp.sys.next.misc
- Path: sparky!uunet!spool.mu.edu!uwm.edu!linac!att!princeton!nimaster.princeton.edu!cedman
- From: cedman@princeton.edu (Carl Edman)
- Subject: Re: Load Meter
- In-Reply-To: gemoe@proximus.north.de's message of Fri, 11 Dec 1992 08:00:34 GMT
- To: gemoe@proximus.north.de (Gerhard Moeller)
- Message-ID: <CEDMAN.92Dec14191712@capitalist.princeton.edu>
- Originator: news@nimaster
- Sender: news@Princeton.EDU (USENET News System)
- Nntp-Posting-Host: capitalist.princeton.edu
- Organization: Princeton University
- References: <1992Dec8.171638.1206@godel.questor.wimsey.bc.ca>
- <1992Dec11.080034.21117@proximus.north.de>
- Date: Mon, 14 Dec 1992 23:17:12 GMT
- Lines: 13
-
- In article <1992Dec11.080034.21117@proximus.north.de> gemoe@proximus.north.de (Gerhard Moeller) writes:
- In article <1992Dec8.171638.1206@godel.questor.wimsey.bc.ca>
- aberno@godel.questor.wimsey.bc.ca (Anthony Berno) writes:
- > I don't know what /dev/kmem does, so this may cause a security problem.
-
- it is the kernel address space, I don't know if there would be a security
- problem, I would be interested.
-
- Positively. A writeable (or even just a readable) kmem allows a
- semi-skilled hacker to do things you didn't even know root could.
-
- Carl Edman
-
-