lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Sun, 17 Aug 2008 20:07:39 -0400 From: Rik van Riel <riel@...hat.com> To: Pavel Machek <pavel@...e.cz> Cc: david@...g.hm, Eric Paris <eparis@...hat.com>, Theodore Tso <tytso@....edu>, davecb@....com, linux-security-module@...r.kernel.org, Adrian Bunk <bunk@...nel.org>, Mihai Don??u <mdontu@...defender.com>, linux-kernel@...r.kernel.org, malware-list@...ts.printk.net, Arjan van de Ven <arjan@...radead.org> Subject: Re: [malware-list] [RFC 0/5] [TALPA] Intro to alinuxinterfaceforon access scanning On Mon, 18 Aug 2008 00:58:44 +0200 Pavel Machek <pavel@...e.cz> wrote: > Rather than modify all the applications using mmap (you can't tell if > the other side is going to use it for shared memory... right?), we > could simply modify all the Windows-facing applications using mmap. If web browsers, office suites and mail clients on Windows have certain kinds of vulnerabilities, it is safe to assume that the same programs on Linux will have similar problems. Can we please get rid of the idea that "Windows facing" is where the whole malware problem is? As for how to solve it - lets try to come up with a solution that is reasonably high performance and can be used for more than just malware scanning. Using the same code for things like HSM would be nice. -- All rights reversed. -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists