Re: Making /proc/kallsyms readable only by root

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Fri, Nov 5, 2010 at 3:31 AM, Mulyadi Santosa
<mulyadi.santosa@xxxxxxxxx> wrote:
> On Fri, Nov 5, 2010 at 03:47, julie Sullivan <kernelmail.jms@xxxxxxxxx> wrote:
>> Hi all,
>> Loosely related to the discussion about /dev/mem and system security
>> compromisation of about a week ago on kernel-newbies, there was this
>> discussion today on lkml for the curious:
>>
>> http://lkml.org/lkml/2010/11/4/94
>
> Oh wait, maybe this patch mean, by restricting it to be readable only
> by root, we reduce attack vector, right? Thus, one can't easily
> predicts address symbols, right?

if permissions are 700 or 400 who cares you need root to do either and
at that point if its 400 can't you just chmod 700 /dev/kallsyms.  or
am I missing something here?

Can someone fill me in on what I am missing.....what type of attacks
does this protect against and by that point would the permissions
matter?
--
John

--
To unsubscribe from this list: send an email with
"unsubscribe kernelnewbies" to ecartis@xxxxxxxxxxxx
Please read the FAQ at http://kernelnewbies.org/FAQ



[Index of Archives]     [Newbies FAQ]     [Linux Kernel Mentors]     [Linux Kernel Development]     [IETF Annouce]     [Git]     [Networking]     [Security]     [Bugtraq]     [Yosemite]     [MIPS Linux]     [ARM Linux]     [Linux RAID]     [Linux SCSI]     [Linux ACPI]
  Powered by Linux