<html>
<head>
<base href="https://bugs.freedesktop.org/" />
</head>
<body>
<p>
<div>
<b><a class="bz_bug_link
bz_status_RESOLVED bz_closed"
title="RESOLVED NOTABUG - moving etc/udev/hwdb.bin to /lib/syslocal"
href="https://bugs.freedesktop.org/show_bug.cgi?id=67553#c6">Comment # 6</a>
on <a class="bz_bug_link
bz_status_RESOLVED bz_closed"
title="RESOLVED NOTABUG - moving etc/udev/hwdb.bin to /lib/syslocal"
href="https://bugs.freedesktop.org/show_bug.cgi?id=67553">bug 67553</a>
from <span class="vcard"><a class="email" href="mailto:eulenreich@gmx.de" title="Ralph_Ulrich <eulenreich@gmx.de>"> <span class="fn">Ralph_Ulrich</span></a>
</span></b>
<pre>Isn't this a potential security risk vector ?
Every admin "root" user in a fatal stress situation uses every tool available
to search for the cause of system break down. We already have a bin
/etc/ld.so.cache as someone pointed out. But these two binaries differ in a
fundamental way:
The contents of ld.so.cache is very dependend of local conditions.
On the contrary hwdb.bin only depend on foreign id strings.
This fact will provoke a sponsoring of Linux administration tools from
cyber-war intelligence. Use case: (Perhaps better to not use the term n.s.a)
The special chinese department will direct manufacturers to release their
hardware with fitting strings. In a way their previously sponsored
administration tools can get out of bounds ...</pre>
</div>
</p>
<hr>
<span>You are receiving this mail because:</span>
<ul>
<li>You are the QA Contact for the bug.</li>
<li>You are the assignee for the bug.</li>
</ul>
</body>
</html>