Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <ab7a4164-1faf-67c2-deb7-f74998ae1dd6@redhat.com>
Date: Tue, 30 May 2017 15:47:02 +0200
From: Florian Weimer <fweimer@...hat.com>
To: Daniel Micay <danielmicay@...il.com>, oss-security@...ts.openwall.com
Cc: Roee Hay <roeehay@...il.com>
Subject: Re: Linux kernel: stack buffer overflow with
 controlled payload in get_options() function

On 05/30/2017 03:25 PM, Daniel Micay wrote:
> Secure boot means verifying boot chain from a root of trust in hardware.

My comments were specifically about UEFI Secure Boot, which apparently
behaves quite differently from what you expect.

Thanks,
Florian

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.