[EMAIL PROTECTED] wrote:

On Tue, 01 Mar 2005 10:09:34 +1000, QuantumG
<[EMAIL PROTECTED]> wrote:


I dunno if anyone else has said this or not, but /dev/kmem and the joy
of kernel exploits can allow an attacker to taint a kernel in ways that
you simply cannot detect. Not to mention the fact that kernel modules



Actually it was mentioned during the current thread, with a mention of articles which demonstrate how it's done, if I remember correctly.

But your message made me wonder - is it practical to disable creation of
/dev/kmem?



Some good insights about /dev/kmem here from a hacker:

http://jclemens.org/knark/creed_interview1.html


O Plameras

--
SLUG - Sydney Linux User's Group Mailing List - http://slug.org.au/
Subscription info and FAQs: http://slug.org.au/faq/mailinglists.html

Reply via email to