[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] Impact of HW vulnerabilities & Implications on Security Vulnerability Process
On 07/09/16 16:33, Ian Jackson wrote: > Lars Kurth writes ("Impact of HW vulnerabilities & Implications on Security > Vulnerability Process"): >> A few years ago it was discovered that much of the RAM shipped in our >> computers contains flaws which allow "leakage" across rows; effectively >> allowing programs to use access to one bit of memory to flip bits in >> other parts of memory to which they have been specifically denied >> access. This has attack on faulty hardware has been dubbed "rowhammer" >> [1]. > ... > >> From my perspective, there are a number of differing goals we are trying >> to achieve with the process > ... >> b) If already public (or at disclosure time), ensure that our users have >> all the information to make the right choices > > This is my concern. > > From my POV XSAs are a convenient established format and process. > > However, I don't think this necessarily needs to be dealt with by > issuing an actual XSA, particularly if there are other reasons for > doing things differently. We could brief our users by writing some > other kind of message, perhaps posted on xen-announce. > > Indeed several aspects of the XSA process are not really applicable. > > One main reason for issuing an XSA for an ordinary software bug is > that it allows the issue, and its fix, to be tracked in a standardised > way. CVEs perform the same function, with a more general scope. > > But, we would not expect to get a CVE for what really amounts to a > hardware quality issue. And where there can be little useful way of > avoiding a hardware bug by adding workarounds to the software > (specifically, in our case, by modifying Xen), there is no need to > track whether any particular codebase has the mitigation. > > So there is little benefit in assigning a number. > > Unlike with software bugs, there is also relatively little benefit in > having rowhammer listed on a web page alongside software bugs. > > The XSA advisory template format does not lend itself well to this > issue, as I found when I tried to write a draft. While does have the > benefit of being in a format which is familiar to users, user response > will have to be quite different. And the level of uncertainty and > hardware-dependence means that the usual questions such as `Impact' > and `Vulnerable systems' have unsatisfactory non-answers, in such a > bulletin. > > We did issue XSA-3 for a mitigationless hardware design problem. But > that was in a very different environment: the XSA process was not as > formally established as it is now, and the publicity implications were > different. What's the conclusion here -- are you inclined to say that we shouldn't issue an XSA, but perhaps do some other sort of announcement? -George _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx https://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |