|
Message-ID: <AANLkTi==6UuJeuCUYeTY_vC+vFM4baMko0p4m+8+zncT@mail.gmail.com> Date: Sun, 20 Mar 2011 15:45:25 -0400 From: Dan Rosenberg <dan.j.rosenberg@...il.com> To: oss-security@...ts.openwall.com Cc: Vasiliy Kulikov <segoon@...nwall.com>, "Steven M. Christey" <coley@...us.mitre.org> Subject: Re: CVE request: kernel: a collection of world-writable debugfs bugs I don't mean to create unnecessary work, but have you actually confirmed that exposing each of these files as world-writable actually allows a user to cross privilege boundaries? It seems to me that while it's bad practice to create these interfaces as world-writable and should be fixed regardless, unless being able to write to one of these interfaces actually allows a user to do something he shouldn't be able to, it's not a security bug by itself. For example, I've noticed interfaces that are created with world-writable file permissions that don't actually do anything useful when you write to them. Regards, Dan On Sun, Mar 20, 2011 at 9:43 AM, Vasiliy Kulikov <segoon@...nwall.com> wrote: > Steven, > > On Wed, Feb 23, 2011 at 16:23 -0500, Josh Bressers wrote: >> Thanks for the list. I don't have enough CVE ids for this, I've grouped >> them by type and version for MITRE to assign IDs. > > Any update on this? > > > Thanks, > > -- > Vasiliy Kulikov > http://www.openwall.com - bringing security into open computing environments >
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.