Kernel address space layout randomization
Kernel address space layout randomization
Posted Oct 17, 2013 22:08 UTC (Thu) by heijo (guest, #88363)In reply to: Kernel address space layout randomization by rwmj
Parent article: Kernel address space layout randomization
If not, what's the point of making them unreadable, since the attacker can, very easily and automatically, determine that the distribution is Ubuntu, and download the files from their servers?
Posted Oct 18, 2013 0:07 UTC (Fri)
by spender (guest, #23067)
[Link]
As for why:
-Brad
Posted Oct 18, 2013 6:21 UTC (Fri)
by rwmj (subscriber, #5474)
[Link] (1 responses)
Posted Jan 24, 2014 15:59 UTC (Fri)
by deepfire (guest, #26138)
[Link]
Really?
Laying bare your code/data layouts for the local would-be-root's perusal is nothing?
OTOH, if your logic goes along the lines of "there's so many other places you can get that information from, it just doesn't matter" -- I could agree.
Kernel address space layout randomization
http://lmgtfy.com/?q=cargo+cult+security
Kernel address space layout randomization
Kernel address space layout randomization
> However there is a lot of pain caused by it.
