On Tue, May 24, 2011 at 11:46:48AM -0700, Kees Cook wrote:
> As we have continued to close kernel address leaks, the kernel syslog
> (dmesg) remains one of the last large places where information is being
> reported. As such, I want to close this off from regular users so that
> local kernel exploits continue to have an even harder time getting a
> foot-hold on vulnerabilities. And, as before, this is a tunable that you
> can change in /etc/sysctl.d/ if you do development work, like getting
> owned, etc. For the average user, this information is not needed.

What are the ways in which kernel addresses are leaked through dmesg?  Can
you provide some examples?  Is it not feasible to avoid leaking addresses,
while still passing on all of the useful data in dmesg to users?

-- 
 - mdz

-- 
ubuntu-devel mailing list
ubuntu-devel@lists.ubuntu.com
Modify settings or unsubscribe at: 
https://lists.ubuntu.com/mailman/listinfo/ubuntu-devel

Reply via email to