Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Tue, 09 Sep 2008 23:08:54 +0800
From: Eugene Teo <eteo@...hat.com>
To: "Steven M. Christey" <coley@...us.mitre.org>
CC: oss-security@...ts.openwall.com, coley@...re.org
Subject: Re: CVE request: kernel: local keyboard DoS through
 LED switching

Steven M. Christey wrote:
> On Tue, 9 Sep 2008, Eugene Teo wrote:
> 
>>> Can this be exploited by anyone except the person sitting at the keyboard?
>> I don't think so. It requires physical access to the console.
> 
> Then perhaps they can use the unplug exploit to DoS the whole system ;-)

Well... heh :)

> Do you have an alternate interpretation of the issue?

Not really. Interesting. I guess this don't need a CVE name then.

Thanks, Eugene
-- 
Eugene Teo / Red Hat Security Response Team

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ