On Fri, Mar 02, 2007 at 04:29:57PM -0800, Greg KH wrote:
> On Sat, Mar 03, 2007 at 01:27:07AM +0100, Oleg Verych wrote:
> > 
> > If you can proof that it doesn't influence kernel's control above system
> > hardware. Ironically such stuff in the userspace can give additional
> > intrusion way to the kernel.
> 
> Do you know of any way to use the firmware interface to the kernel for
> intrusion?  If so, please let us know and we will fix it.
> 
> Otherwise, baseless speculation doesn't help out anyone.

This is not baseless for a particular distro
scripts/directories/firmware files. Chain of trust between user and
kernel includes on only kernel developers.

A way straight to the kernel _is_ there and it's provided by userspace
firmware loader. And only you can do is accept a thing much like as
signing firmwares (similar to posted patch to sign modules :).

So if you are accepting a firmware into the kernel, watch closely how
it's being used. Tracking static symbols vs. buffer's content from
request_firmware() can be harder, i think.

_____

-------------------------------------------------------------------------
Take Surveys. Earn Cash. Influence the Future of IT
Join SourceForge.net's Techsay panel and you'll get the chance to share your
opinions on IT & business topics through brief surveys-and earn cash
http://www.techsay.com/default.php?page=join.php&p=sourceforge&CID=DEVDEV
_______________________________________________
linux-usb-devel@lists.sourceforge.net
To unsubscribe, use the last form field at:
https://lists.sourceforge.net/lists/listinfo/linux-usb-devel

Reply via email to