Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id ; Thu, 24 Oct 2002 07:03:30 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id ; Thu, 24 Oct 2002 07:03:30 -0400 Received: from mail.hometree.net ([212.34.181.120]:16073 "EHLO mail.hometree.net") by vger.kernel.org with ESMTP id ; Thu, 24 Oct 2002 07:03:30 -0400 To: linux-kernel@vger.kernel.org Path: forge.intermeta.de!not-for-mail From: "Henning P. Schmiedehausen" Newsgroups: hometree.linux.kernel Subject: Re: One for the Security Guru's Date: Thu, 24 Oct 2002 11:09:41 +0000 (UTC) Organization: INTERMETA - Gesellschaft fuer Mehrwertdienste mbH Message-ID: References: <20021023130251.GF25422@rdlg.net> <1035411315.5377.8.camel@god.stev.org> <20021024101126.GQ147946@niksula.cs.hut.fi> Reply-To: hps@intermeta.de NNTP-Posting-Host: forge.intermeta.de X-Trace: tangens.hometree.net 1035457781 18587 212.34.181.4 (24 Oct 2002 11:09:41 GMT) X-Complaints-To: news@intermeta.de NNTP-Posting-Date: Thu, 24 Oct 2002 11:09:41 +0000 (UTC) X-Copyright: (C) 1996-2002 Henning Schmiedehausen X-No-Archive: yes X-Newsreader: NN version 6.5.1 (NOV) Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 833 Lines: 18 Ville Herva writes: >the /dev/kmem hole, but this closes 2 classes of attacks - loading rootkit >module and booting with a hacked kernel in straight-forward way. Question: What do I lose when you remove /dev/kmem? Related question: Would it be useful to make /dev/kmem read-only? Regards Henning -- Dipl.-Inf. (Univ.) Henning P. Schmiedehausen -- Geschaeftsfuehrer INTERMETA - Gesellschaft fuer Mehrwertdienste mbH hps@intermeta.de Am Schwabachgrund 22 Fon.: 09131 / 50654-0 info@intermeta.de D-91054 Buckenhof Fax.: 09131 / 50654-20 - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/