Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <AANLkTi==6UuJeuCUYeTY_vC+vFM4baMko0p4m+8+zncT@mail.gmail.com>
Date: Sun, 20 Mar 2011 15:45:25 -0400
From: Dan Rosenberg <dan.j.rosenberg@...il.com>
To: oss-security@...ts.openwall.com
Cc: Vasiliy Kulikov <segoon@...nwall.com>, "Steven M. Christey" <coley@...us.mitre.org>
Subject: Re: CVE request: kernel: a collection of
 world-writable debugfs bugs

I don't mean to create unnecessary work, but have you actually
confirmed that exposing each of these files as world-writable actually
allows a user to cross privilege boundaries?  It seems to me that
while it's bad practice to create these interfaces as world-writable
and should be fixed regardless, unless being able to write to one of
these interfaces actually allows a user to do something he shouldn't
be able to, it's not a security bug by itself.  For example, I've
noticed interfaces that are created with world-writable file
permissions that don't actually do anything useful when you write to
them.

Regards,
Dan

On Sun, Mar 20, 2011 at 9:43 AM, Vasiliy Kulikov <segoon@...nwall.com> wrote:
> Steven,
>
> On Wed, Feb 23, 2011 at 16:23 -0500, Josh Bressers wrote:
>> Thanks for the list. I don't have enough CVE ids for this, I've grouped
>> them by type and version for MITRE to assign IDs.
>
> Any update on this?
>
>
> Thanks,
>
> --
> Vasiliy Kulikov
> http://www.openwall.com - bringing security into open computing environments
>

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.