lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <20090825152734.21419.qmail@securityfocus.com> Date: 25 Aug 2009 15:27:34 -0000 From: phcoder@...il.com To: bugtraq@...urityfocus.com Subject: Re: [IVIZ-08-009] Grub Legacy Security Model bypass exploiting wrong BIOS API usage This problem is not a threat because root user is able to boot any kernel without going through boot sequence (kexec) and is able to recover disk encryption key by inspecting dmcrypt module in memory. If an OS allows user to read raw memory without being root it's a security hole in OS and not in GRUB