Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Fri, 19 Feb 2010 08:47:50 +0800
From: Eugene Teo <eugene@...hat.com>
To: oss-security@...ts.openwall.com
CC: "Steven M. Christey" <coley@...us.mitre.org>
Subject: Re: CVE request: kernel information leak via userspace
 USB interface

On 02/19/2010 12:53 AM, Steven M. Christey wrote:
>
> On Thu, 18 Feb 2010, Marcus Meissner wrote:
>
>> Are we considering "giving desktop local users unintended rights"
>> a security issue or not?
>
> from a CVE purist perspective, if the security model is that "users with
> physical access should not be able to read portions of kernel memory"
> then a violation of that is technically a vulnerability, even if the
> attack complexity is high - assuming that there isn't already some
> easier way that the attacker can get the same results through legitimate
> means. Being able to crash the system by plugging in a USB device (for
> example) is about as easy as the defenestration exploit - i.e. throwing
> the computer out the window - so in that case I wouldn't view it as a
> vulnerability. If someone with physical access can read the kernel
> memory that's being leaked, if don't already own the box, that seems a
> little more like a vulnerability to me.

Thanks for clarifying!

Eugene
-- 
Eugene Teo / Red Hat Security Response Team

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.