Kernel address space layout randomization
Kernel address space layout randomization
Posted Oct 13, 2013 17:26 UTC (Sun) by rwmj (subscriber, #5474)Parent article: Kernel address space layout randomization
Anyway, here's hoping that once this is implemented, Ubuntu will make the vmlinuz files public readable again (and thus gain the much bigger security benefits of using libguestfs and VM sandboxes for user processes).
Posted Oct 17, 2013 22:08 UTC (Thu)
by heijo (guest, #88363)
[Link] (3 responses)
If not, what's the point of making them unreadable, since the attacker can, very easily and automatically, determine that the distribution is Ubuntu, and download the files from their servers?
Posted Oct 18, 2013 0:07 UTC (Fri)
by spender (guest, #23067)
[Link]
As for why:
-Brad
Posted Oct 18, 2013 6:21 UTC (Fri)
by rwmj (subscriber, #5474)
[Link] (1 responses)
Posted Jan 24, 2014 15:59 UTC (Fri)
by deepfire (guest, #26138)
[Link]
Really?
Laying bare your code/data layouts for the local would-be-root's perusal is nothing?
OTOH, if your logic goes along the lines of "there's so many other places you can get that information from, it just doesn't matter" -- I could agree.
Kernel address space layout randomization
Kernel address space layout randomization
http://lmgtfy.com/?q=cargo+cult+security
Kernel address space layout randomization
Kernel address space layout randomization
> However there is a lot of pain caused by it.
