lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CACdnJuvR1h+qn=EqiWDAR3m1LcPyqMszLbQbO0j9b3HYkc1nDQ@mail.gmail.com>
Date:   Tue, 20 Feb 2018 21:35:20 +0000
From:   Matthew Garrett <mjg59@...gle.com>
To:     tony.luck@...el.com
Cc:     Linus Torvalds <torvalds@...ux-foundation.org>,
        joe.konno@...ux.intel.com, linux-efi <linux-efi@...r.kernel.org>,
        Linux Kernel Mailing List <linux-kernel@...r.kernel.org>,
        Ard Biesheuvel <ard.biesheuvel@...aro.org>,
        matthew.garrett@...ula.com, jk@...abs.org, ak@...ux.intel.com,
        pjones@...hat.com, luto@...nel.org,
        James Bottomley <james.bottomley@...senpartnership.com>
Subject: Re: [PATCH 1/2] fs/efivarfs: restrict inode permissions

On Tue, Feb 20, 2018 at 1:32 PM Luck, Tony <tony.luck@...el.com> wrote:

> The immediate problem is the denial of service attack.  I have
> a nagging worry that allowing a user to cause an SMI at a precise
> time might also be a problem. But I don't know how that could be
> leveraged in some other attack.

The thing that worries me here is that if it's possible for root to
potentially attack the kernel then just changing the permissions is still
allowing an escalation of privilege. The other approaches would also block
this.

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ