>But anyway, it really doesn't matter. With the right permissions only >root has access to /dev/mem so nobody can get the plain text password. >If somebody already got root on the machine, you already *have* a >problem cause (s)he shouldn't have got root anyway. What I had in mind was that one can exploit a buffer overflow and read /dev/mem. Even though when the buffer overflow is patched, you still have a legitimate backdoor. No SUID , trjoans or lkms needed to re-enter as root. Or maybe add a new user like "httpbackup" and change the group of the user as kmem so that he knows the root password all the way. But i guess bzero'ing the the buffers is what needs to be done ... n something i would like to take care of in the future in my code. -- Kernelnewbies: Help each other learn about the Linux kernel. Archive: http://mail.nl.linux.org/kernelnewbies/ IRC Channel: irc.openprojects.net / #kernelnewbies Web Page: http://www.kernelnewbies.org/