tech-embed archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
Re: LKM
Pål Halvorsen <paalh%unik.no@localhost> writes:
> So the conclusion is that if a user want to crach the system, he/she might
> do so by allowing the module do "illegal" operations on some kernel
> structures.
To load a module, one must have root priveleges and the securelevel
must be 0 or -1. At those securelevels there are plenty of other ways
for root to crash the system (scribbling on /dev/mem, for example).
- Nathan
Home |
Main Index |
Thread Index |
Old Index