|
Message-ID: <4D650888.9050604@pre-sense.de> Date: Wed, 23 Feb 2011 14:15:52 +0100 From: Timo Warns <warns@...-sense.de> To: oss-security@...ts.openwall.com Subject: Re: Physical access vulnerabilities and auto-mounting Am 23.02.2011 12:07, schrieb Steve Grubb: > On Wednesday, February 23, 2011 12:11:56 am Eugene Teo wrote: >> On 02/23/2011 12:17 PM, Dan Rosenberg wrote: >>> Should auto-mounting be disabled entirely? > > You should be able to turn it off. You can also block the loading of any kernel modules > for file systems that you know you don't want to load. To a certain extent, this is what makes the recent issues in partition handling special: The current kernels do not allow to turn off the evaluation of partition tables. (However, some patches allow to do so: https://patchwork.kernel.org/patch/47067/) Best regards, Timo -- Dr. Timo Warns warns@...-sense.de Tel. +49 - 40 - 244 2407 - 16 Fax +49 - 40 - 244 2407 - 24 PRESENSE Technologies GmbH Sachsenstr. 5, D-20097 HH USt-IdNr.: DE263765024 Geschäftsführer/Managing Directors AG Hamburg, HRB 107844 Till Dörges Jürgen Sander Axel Theilmann
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.