Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Wed, 23 Feb 2011 14:15:52 +0100
From: Timo Warns <warns@...-sense.de>
To: oss-security@...ts.openwall.com
Subject: Re: Physical access vulnerabilities and auto-mounting

Am 23.02.2011 12:07, schrieb Steve Grubb:
> On Wednesday, February 23, 2011 12:11:56 am Eugene Teo wrote:
>> On 02/23/2011 12:17 PM, Dan Rosenberg wrote:
>>> Should auto-mounting be disabled entirely? 
> 
> You should be able to turn it off. You can also block the loading of any kernel modules 
> for file systems that you know you don't want to load.

To a certain extent, this is what makes the recent issues in partition
handling special: The current kernels do not allow to turn off the
evaluation of partition tables.
(However, some patches allow to do so:
https://patchwork.kernel.org/patch/47067/)

Best regards, Timo

-- 
Dr. Timo Warns                               warns@...-sense.de
                                  Tel. +49 - 40 - 244 2407 - 16
                                  Fax  +49 - 40 - 244 2407 - 24
PRESENSE Technologies GmbH            Sachsenstr. 5, D-20097 HH
                                         USt-IdNr.: DE263765024
Geschäftsführer/Managing Directors       AG Hamburg, HRB 107844
Till Dörges           Jürgen Sander              Axel Theilmann

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.