User: Password:
|
|
Subscribe / Log in / New account

Kernel address space layout randomization

Kernel address space layout randomization

Posted Oct 17, 2013 22:08 UTC (Thu) by heijo (guest, #88363)
In reply to: Kernel address space layout randomization by rwmj
Parent article: Kernel address space layout randomization

Does Ubuntu somehow randomly alter the vmlinuz files on disk?

If not, what's the point of making them unreadable, since the attacker can, very easily and automatically, determine that the distribution is Ubuntu, and download the files from their servers?


(Log in to post comments)

Kernel address space layout randomization

Posted Oct 18, 2013 0:07 UTC (Fri) by spender (subscriber, #23067) [Link]

They don't and of course you can absolutely automatically do what you just mentioned.

As for why:
http://lmgtfy.com/?q=cargo+cult+security

-Brad

Kernel address space layout randomization

Posted Oct 18, 2013 6:21 UTC (Fri) by rwmj (subscriber, #5474) [Link]

There's no security added by chmod go-r those files. However there is a lot of pain caused by it.

Kernel address space layout randomization

Posted Jan 24, 2014 15:59 UTC (Fri) by deepfire (guest, #26138) [Link]

> There's no security added by chmod go-r those files.
> However there is a lot of pain caused by it.

Really?

Laying bare your code/data layouts for the local would-be-root's perusal is nothing?

OTOH, if your logic goes along the lines of "there's so many other places you can get that information from, it just doesn't matter" -- I could agree.


Copyright © 2017, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds