tech-embed archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]


Pål Halvorsen <> writes:

> So the conclusion is that if a user want to crach the system, he/she might
> do so by allowing the module do "illegal" operations on some kernel
> structures.

To load a module, one must have root priveleges and the securelevel
must be 0 or -1. At those securelevels there are plenty of other ways
for root to crash the system (scribbling on /dev/mem, for example).

        - Nathan

Home | Main Index | Thread Index | Old Index