oss-sec mailing list archives
Re: Re: More CONFIG_VMAP_STACK vulnerabilities, refcount_t UAF, and an ignored Secure Boot bypass / rootkit meth
From: "PaX Team" <pageexec () freemail hu>
Date: Tue, 27 Jun 2017 01:50:39 +0200
On 26 Jun 2017 at 16:59, Kurt Seifried wrote:
On 2017-06-26 3:50 PM, PaX Team wrote:On 26 Jun 2017 at 13:47, Kurt Seifried wrote:I think we can agree as a community of professionals that insults and name calling are unnecessary and also not very effective.I completely agree with you but then I can't explain why you chose to insult our projects last week and still have not remedied it (both the CVE and your insulting tweet are still up). I find it curious how you can preach about professionalism after being the very instigator of the recent splat (heck, instead of answering, you called it a conspiracy theory when I asked you in private why you issued the CVE to begin with which then forced us to take the issue public).So as per the private email thread we had previously I'm not going to be interacting with you beyond what is strictly neccesary for CVE and other professional purposes.
Since your professional job is to issue CVEs and you did so in our case based on an erroneous judgement call, I believe it falls into this category.
One the CVE REJECT side, CVE-2017-1000377 looks legitimate,
You have yet to explain why it is so. The Qualys advisory and their explicit reject requests state the exact opposite.
although I'm inclined to agree with Qualys and REJECT it so that you stop emailing.
I will stop emailing you when you live up to your professional obligation and make sure that the CVE you issued in error is rescinded.
I did contact MITRE, I haven't had time to reply to them yet (they are also wondering why the CVE needs REJECT'ing), as such I think it may be best to recuse myself from this specific CVE and let you handle this with MITRE. I have also previously told you how to go about doing this.
You said that the requestor has to ask for the rejection. Since you are the requestor, only you can do so though you tried to drag Qualys into this. They still made the reject request a week ago but you haven't acted on it yet despite your promise to do so. Now you're telling us that we have yet something else to do? Please elaborate as your past communications didn't explain any further.
I will say that CVE identifiers doesn't just cover full code execution flaws, but also covers situations where for example a security property is claimed but is not as effective as we thought (e.g. the stackguard page size in this case). Many CVE's are not fully exploitable on their own but are part of an exploit chain.
What security property did we claim for the kernel enforced heap-stack gap size? Can you recite anything we said anywhere about that supports your claim? cheers, PaX Team
Current thread:
- Re: More CONFIG_VMAP_STACK vulnerabilities, refcount_t UAF, and an ignored Secure Boot bypass / rootkit method, (continued)
- Re: More CONFIG_VMAP_STACK vulnerabilities, refcount_t UAF, and an ignored Secure Boot bypass / rootkit method Linus Torvalds (Jun 23)
- Re: More CONFIG_VMAP_STACK vulnerabilities, refcount_t UAF, and an ignored Secure Boot bypass / rootkit method Brad Spengler (Jun 24)
- Re: More CONFIG_VMAP_STACK vulnerabilities, refcount_t UAF, and an ignored Secure Boot bypass / rootkit method Brad Spengler (Jun 24)
- Re: More CONFIG_VMAP_STACK vulnerabilities, refcount_t UAF, and an ignored Secure Boot bypass / rootkit method Linus Torvalds (Jun 24)
- Re: Re: More CONFIG_VMAP_STACK vulnerabilities, refcount_t UAF, and an ignored Secure Boot bypass / rootkit method Brad Spengler (Jun 24)
- Re: Re: More CONFIG_VMAP_STACK vulnerabilities, refcount_t UAF, and an ignored Secure Boot bypass / rootkit method Mansour Moufid (Jun 26)
- Re: Re: More CONFIG_VMAP_STACK vulnerabilities, refcount_t UAF, and an ignored Secure Boot bypass / rootkit method Kurt Seifried (Jun 26)
- RE: Re: More CONFIG_VMAP_STACK vulnerabilities, refcount_t UAF, and an ignored Secure Boot bypass / rootkit method Christey, Steven M. (Jun 26)
- Re: Re: More CONFIG_VMAP_STACK vulnerabilities, refcount_t UAF, and an ignored Secure Boot bypass / rootkit meth PaX Team (Jun 27)
- Re: Re: More CONFIG_VMAP_STACK vulnerabilities, refcount_t UAF, and an ignored Secure Boot bypass / rootkit meth Kurt Seifried (Jun 26)
- Re: Re: More CONFIG_VMAP_STACK vulnerabilities, refcount_t UAF, and an ignored Secure Boot bypass / rootkit meth PaX Team (Jun 27)
- Re: More CONFIG_VMAP_STACK vulnerabilities, refcount_t UAF, and an ignored Secure Boot bypass / rootkit method Linus Torvalds (Jun 23)
- civilized discussion (Re: More CONFIG_VMAP_STACK vulnerabilities, refcount_t UAF, and an ignored Secure Boot bypass / rootkit method) Solar Designer (Jun 26)
- Re: civilized discussion (Re: More CONFIG_VMAP_STACK vulnerabilities, refcount_t UAF, and an ignored Secure Boot bypass / rootkit method) Kurt Seifried (Jun 26)
- Re: civilized discussion (Re: More CONFIG_VMAP_STACK vulnerabilities, refcount_t UAF, and an ignored Secure Boot bypass / rootkit method) Kyle R (Jun 27)