oss-sec mailing list archives
Re: Linux kernel CVE fixes
From: Marcus Meissner <meissner () suse de>
Date: Wed, 27 Nov 2013 09:41:32 +0100
On Fri, Nov 22, 2013 at 01:16:45PM -0800, Kees Cook wrote:
Hi, Here are some further issues found by Nico Golde and Fabian Yamaguchi: http://git.kernel.org/linus/b4789b8e6be3151a955ade74872822f30e8cd914 CVE-2013-6380
I got the question why this warrants a CVE as it is protected by CAP_SYS_ADMIN. Only reason I would see is a "root user" -> "kernel code execution" path which might otherwise be blocked by secure boot or other protection mechanisms? Ciao, Marcus
Current thread:
- Linux kernel CVE fixes Kees Cook (Nov 22)
- Re: Linux kernel CVE fixes Marcus Meissner (Nov 27)