Gentoo Archives: gentoo-user

From: Michael Orlitzky <mjo@g.o>
To: gentoo-user@l.g.o
Subject: Re: [gentoo-user] Kernel modules and security
Date: Fri, 22 Mar 2019 15:21:37
Message-Id: 6f45c6d2-5c6d-5ee6-480e-01ff5e3ad51b@gentoo.org
In Reply to: [gentoo-user] Kernel modules and security by Peter Humphrey
1 On 3/22/19 10:46 AM, Peter Humphrey wrote:
2 > Hello list,
3 >
4 > Years ago, in the days of Yggdrasil I think, the received wisdom was that
5 > enabling kernel module loading was a bad idea because an attacker might be
6 > able to load malicious software directly into the kernel. No modules --> one
7 > more attack route closed.
8 >
9 > What is the current thinking on this topic? I'm not trolling; I'd like to know
10 > which way to go with a new box.
11 >
12
13 The only way a non-root user can load a module into the kernel is if the
14 kernel itself has a critical security flaw in the module-loading code. I
15 would hope that said code is bullet-proof by now, but the risk is
16 non-zero I guess.
17
18 On the other hand, kernel drivers go ape-shit on me all the time, and
19 having the ability to force-unload and reload them (without a reboot) is
20 a life saver. Being able to build and load one module at a time also
21 speeds up the kernel build -> oops I forgot something -> build loop.