Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Thu, 22 Aug 2019 21:13:11 -0400
From: "Perry E. Metzger" <perry@...rmont.com>
To: Eddie Chapman <eddie@...k.net>
Cc: oss-security@...ts.openwall.com
Subject: Re: Linux kernel: multiple vulnerabilities in the
 USB subsystem x2

On Thu, 22 Aug 2019 20:33:54 +0100 Eddie Chapman <eddie@...k.net>
wrote:
> On 22/08/2019 20:00, Perry E. Metzger wrote:
> > You can argue anything you like. Power charging points have
> > popped up around the world, and you're not in a position to stop
> > them. Furthermore, I'll note that over the air exploitable bugs in
> > things like WiFi stacks and Bluetooth stacks have also appeared
> > over time; perhaps it's foolish to have your phone on at all, and
> > yet people will continue to turn their phones on, and even to use
> > them.
> 
> Well, I certainly am not deluded enough to think I have the power
> to stop power charging points popping up everywhere :-) Or to stop
> people making mistakes. Just because something is possible and
> everyone else does it doesn't make something less stupid.
> 
> It's a similar principle with wifi/bluetooth, which is why I avoid 
> connecting even to a family member's wifi access point unless it's 
> absolutely necessary.

I think the fact that you avoid connecting to WiFi access points,
even ones owned by family members, unless absolutely necessary, may
demonstrate that your model of what does and does not constitute
a ordinary user behavior might not be the same as other
people's. Most people do use WiFi in a variety of places, and most
people do charge off of USB ports they have not personally vetted.

Given this, I think fixing bugs that might lead to privilege
escalation, even if they require physical connection of USB devices,
does indeed seem reasonable.

--
Perry E. Metzger		perry@...rmont.com

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.