[EMAIL PROTECTED] wrote:
On Tue, 01 Mar 2005 10:09:34 +1000, QuantumG
<[EMAIL PROTECTED]> wrote:
I dunno if anyone else has said this or not, but /dev/kmem and the joy
of kernel exploits can allow an attacker to taint a kernel in ways that
you simply cannot detect. Not to mention the fact that kernel modules
Actually it was mentioned during the current thread, with a mention of articles which demonstrate how it's done, if I remember correctly.
But your message made me wonder - is it practical to disable creation of
/dev/kmem?
Some good insights about /dev/kmem here from a hacker:
http://jclemens.org/knark/creed_interview1.html
O Plameras
-- SLUG - Sydney Linux User's Group Mailing List - http://slug.org.au/ Subscription info and FAQs: http://slug.org.au/faq/mailinglists.html
