On Thu, 2006-10-19 at 16:57 -0400, Post, Mark K wrote:
> What are the permissions on /dev/vmcp?

Even if you set the permission of /dev/vmcp to allow normal users to
access the device, it won't allow the user to execute cp commands. There
is an additional CAP_SYS_ADMIN check in the vmcp_open function.
The reason is that a user that can execute cp commands owns the machine,
with strategically placed vmcp "STORE <addr> <data>" calls you change
any code in the kernel. So you better make sure that nobody who is not
trusted can get control to issue arbitrary cp commands. That is
especially true if you use vmpc in a web interface. It sounds like a
very dangerous thing to do.

--
blue skies,
  Martin.

Martin Schwidefsky
Linux for zSeries Development & Services
IBM Deutschland Entwicklung GmbH

"Reality continues to ruin my life." - Calvin.

----------------------------------------------------------------------
For LINUX-390 subscribe / signoff / archive access instructions,
send email to [EMAIL PROTECTED] with the message: INFO LINUX-390 or visit
http://www.marist.edu/htbin/wlvindex?LINUX-390

Reply via email to