A crypto module loading vulnerability
A crypto module loading vulnerability
Posted Jan 29, 2015 4:17 UTC (Thu) by josh (subscriber, #17465)Parent article: A crypto module loading vulnerability
Posted Jan 29, 2015 10:57 UTC (Thu)
by PaXTeam (guest, #24616)
[Link]
Posted Jan 29, 2015 13:54 UTC (Thu)
by SLi (subscriber, #53131)
[Link] (2 responses)
Perhaps the kernel config help should tell which modules are probably important and which are not?
And when I'm compiling a kernel for myself, if I want to prepare for the case that I purchase some new hardware (without knowing in advance what), which modules should I build if I want to avoid recompiling the kernel again?
Posted Jan 29, 2015 16:45 UTC (Thu)
by josh (subscriber, #17465)
[Link] (1 responses)
For another, I'd love to see many of the in-kernel filesystem implementations for obscure filesystems (the kind typically only used for data forensics and recovery) turned into FUSE filesystems and moved into sandboxes in userspace, where an exploit does much less harm. A bit of work on compatibility could allow "mount -t obscurefs" to automatically become "mount -t fuse.obscurefs". Ditto for any other such functionality that could be moved to userspace without affecting its users.
Posted Feb 7, 2015 9:10 UTC (Sat)
by farnz (subscriber, #17727)
[Link]
A crypto module loading vulnerability
A crypto module loading vulnerability
A crypto module loading vulnerability
For the first suggestion, do you mean something like Fedora's kernel-modules-extra package? It moves a selection of lesser used modules into a separate package, so that they're still available if you need them, but not installed if you don't (and most people don't need them).
A crypto module loading vulnerability
