On Sat, Mar 03, 2007 at 01:56:31AM +0100, Oleg Verych wrote:
> On Fri, Mar 02, 2007 at 04:29:57PM -0800, Greg KH wrote:
> > On Sat, Mar 03, 2007 at 01:27:07AM +0100, Oleg Verych wrote:
> > > 
> > > If you can proof that it doesn't influence kernel's control above system
> > > hardware. Ironically such stuff in the userspace can give additional
> > > intrusion way to the kernel.
> > 
> > Do you know of any way to use the firmware interface to the kernel for
> > intrusion?  If so, please let us know and we will fix it.
> > 
> > Otherwise, baseless speculation doesn't help out anyone.
> 
> This is not baseless for a particular distro
> scripts/directories/firmware files. Chain of trust between user and
> kernel includes on only kernel developers.
> 
> A way straight to the kernel _is_ there and it's provided by userspace
> firmware loader. And only you can do is accept a thing much like as
> signing firmwares (similar to posted patch to sign modules :).

No, the way is to control the device, not the kernel directly.  Unless
you can somehow control the kernel through the device itself, a vector
that is not impossible, but very difficult.

Although with network devices using firmware, the simple ability to
snoop the traffic might be enough :)

thanks,

greg k-h

-------------------------------------------------------------------------
Take Surveys. Earn Cash. Influence the Future of IT
Join SourceForge.net's Techsay panel and you'll get the chance to share your
opinions on IT & business topics through brief surveys-and earn cash
http://www.techsay.com/default.php?page=join.php&p=sourceforge&CID=DEVDEV
_______________________________________________
linux-usb-devel@lists.sourceforge.net
To unsubscribe, use the last form field at:
https://lists.sourceforge.net/lists/listinfo/linux-usb-devel

Reply via email to