|
Message-ID: <20170530165015.GA4884@openwall.com> Date: Tue, 30 May 2017 18:50:15 +0200 From: Solar Designer <solar@...nwall.com> To: oss-security@...ts.openwall.com Subject: Re: Linux kernel: stack buffer overflow with controlled payload in get_options() function Hi all, Kurt CC'ed me, implying I should comment. So I will. I think Daniel is mostly right about the technical aspects of the issue. For most setups, it's non-security. Roee Hay brought the below related issue to the distros list on May 16: http://www.openwall.com/lists/oss-security/2017/05/23/16 I didn't participate in the discussion about it on distros as others appeared to be handling it OK'ish (within list policy). In that discussion, Jason A. Donenfeld asked about init=/bin/sh, to which Roee Hay replied: | Great question! I think your point is perfectly valid, however please note that at least for the late AOSP boot/recovery images, the rootfs has contains a very limited set of binaries (see next). Moreover, a bootloader vuln could theoretically give you partial control only over the kernel cmdline (e.g. 'init=' and such are filtered, but 'lp=' is not). | | Nexus 6: | shamu:/ # ls -la /sbin | adbd healthd slideshow ueventd watchdogd | | Nexus 6P: | angler:/ # ls /sbin | adbd healthd ueventd watchdogd This might or might not be a valid point, but I think handling the issue via the distros list (and thus with an embargo) was wrong. It would have been better to have this discussion (if we must) on oss-security right away, rather than only now when a second related issue is brought in here later same month. Going forward, I think I should insist that such mostly non-security and minor issues be made public right away. Unfortunately, this will be spammy to oss-security, like this thread maybe was, but we do have a policy to bring everything from distros to oss-security eventually anyway, and I do not want to introduce my own judgement on what's a security issue vs. not, especially in cases where opinions vary as we've seen in this thread. Luckily, the latest issue that started this thread wasn't ever on the distros list. That's an improvement. On Tue, May 30, 2017 at 09:36:22AM -0600, Kurt Seifried wrote: > Red Hat is only associated with this in so far as I happen to work for Red > Hat and I typically do the CVE assignments on the distros@ list (where this > issue was initially reported). I guess Daniel might be associating the other side's arguments with Red Hat's because Florian was posting from a redhat.com address. I have no idea whether Florian actually spoke on behalf of Red Hat or not, but either way I think the focus on Red Hat is excessive - e.g., in the distros list thread on the previous issue, another distro vendor inquired about the proposed public disclosure date, implying they also might care. A better summary would be: understanding & opinions vary. > > Sorry for thinking that this should be about something more than > > padding CVs and marketing materials. > > I suggest then you take this up with the original researcher if you're > worried about people padding their CVs. I am not happy about judging other people (especially as I could be wrong) nor moderating the list based on such criteria. It's irrelevant what someone's motivation is.(*) It's relevant whether the messages are valuable, which I admit is questionable here. Sometimes things get way too spammy such as in message wording or count. In this thread, we're probably above the message count that this topic is worth. (*) While motivation is irrelevant to list moderation, it is nevertheless relevant to processes in this and related communities, which might affect software security. It may also be relevant to risks from individual security issues, such as when some issues are first sold to a bug bounty program and are only made public when there's upstream fix. But I digress. > This discussion isn't > productive/helpful and I suggest you take it off list. To me, it looks like the discussion had already ended, even if without people getting on the same page, by the time Kurt posted. I can only confirm that, yes, we should probably end this thread here unless someone has something entirely new to add. Alexander P.S. What a waste of time.
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.