Hello.

> This is a very strange reasoning. I can say that restarting on an IO error
> (that can happen in normal situations) could cause another security issue,
> such as DoS. EIO is not a data integrity error; it can happen even higher
> in the storage stack... and the application should handle it anyway.

In the default mode of operation, there should be no panic/reboot on
an I/O error.

The issue and the proposed patch affect the non-default modes:
panic_on_corruption and restart_on_corruption.
Users relying on one of those two modes expect the system to crash if
something goes wrong [1]. So, DoS is expected here. Returning I/O
errors to the reader isn't something that is expected here (see [1]).

The issue allows the attacker to "downgrade" the "panic_on_corruption"
and "restart_on_corruption" modes to the default one by creating
unreadable sectors on the underlying media (e.g., through the Write
Uncorrectable command).

References:
1. https://github.com/flatcar/Flatcar/issues/422

Reply via email to