On Thu, Jun 22, 2006 at 01:04:00PM +0100, Constantine A. Murenin wrote:
> On 21/06/06, Joco Salvatti <[EMAIL PROTECTED]> wrote:
> >So the attacker could enter in single
> >user mode, without the need for the root password, and load a
> >malicious kernel module.
> 
> The attacker cannot load a malicious kernel module on OpenBSD, because
> OpenBSD specifically does not support loadable kernel modules for good. :)

Oh yeah?  I guess I must be imagining things when I start vmware :-)

anchovy<1>:~$ uname -a
OpenBSD anchovy.countersiege.com 3.9 GENERIC#58 i386
anchovy<1>:~$ modstat
Type     Id Off Loadaddr Size Info     Rev Module Name
DEV       0  29 e8d01000 0001 e8d01220   2 linuxrtc
DEV       1  30 e8d7b000 0005 e8d7f300   2 vmmon
DEV       2  31 e8dfa000 0002 e8dfbce0   2 vmnet

Reply via email to