[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CACdnJuvR1h+qn=EqiWDAR3m1LcPyqMszLbQbO0j9b3HYkc1nDQ@mail.gmail.com>
Date: Tue, 20 Feb 2018 21:35:20 +0000
From: Matthew Garrett <mjg59@...gle.com>
To: tony.luck@...el.com
Cc: Linus Torvalds <torvalds@...ux-foundation.org>,
joe.konno@...ux.intel.com, linux-efi <linux-efi@...r.kernel.org>,
Linux Kernel Mailing List <linux-kernel@...r.kernel.org>,
Ard Biesheuvel <ard.biesheuvel@...aro.org>,
matthew.garrett@...ula.com, jk@...abs.org, ak@...ux.intel.com,
pjones@...hat.com, luto@...nel.org,
James Bottomley <james.bottomley@...senpartnership.com>
Subject: Re: [PATCH 1/2] fs/efivarfs: restrict inode permissions
On Tue, Feb 20, 2018 at 1:32 PM Luck, Tony <tony.luck@...el.com> wrote:
> The immediate problem is the denial of service attack. I have
> a nagging worry that allowing a user to cause an SMI at a precise
> time might also be a problem. But I don't know how that could be
> leveraged in some other attack.
The thing that worries me here is that if it's possible for root to
potentially attack the kernel then just changing the permissions is still
allowing an escalation of privilege. The other approaches would also block
this.
Powered by blists - more mailing lists