Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 21 Apr 1997 10:10:03 -0700 (PDT)
From:      "Jin Guojun[ITG]" <jin@george.lbl.gov>
To:        freebsd-bugs
Subject:   Re: kern/3365: LKMs are a security hole -- need way to disable them
Message-ID:  <199704211710.KAA01160@freefall.freebsd.org>

next in thread | raw e-mail | index | archive | help
The following reply was made to PR kern/3365; it has been noted by GNATS.

From: "Jin Guojun[ITG]" <jin@george.lbl.gov>
To: FreeBSD-gnats-submit@FreeBSD.ORG, pst@jnx.com
Cc:  Subject: Re: kern/3365: LKMs are a security hole -- need way to disable them
Date: Mon, 21 Apr 1997 10:06:14 -0700

 > Any FreeBSD machine where you'd like to stop someone who gains root from
 > mucking with your kernel.
 > 
 > >Description:
 > 
 > It's too easy for someone to gain root and add optional functionality to
 > your kernel (such as the snp pseudo-device, or perhaps BPF support...albiet
 > BPF is a bit harder).
 
 I am not clear how this can happen. One has to be root (having root access)
 to do LKM load. Some condition for one modifying the LKM object. So how easy
 for every one to gain root without root access right.
 
 If you put LKM object at a non-secure place, then it is not the LKM problem :-)
 
 -Jin
 



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199704211710.KAA01160>