> My proposal, going forwards, is to not produce security advisories or 
> releases for these local denial of service attacks. Local issues that can 
> result in privilege escalation, or denial of service attacks that can be 
> performed by those outside a sites infrastructure would still result in 
> advisories.

Putting my security hat on, I think that local DOS impact
is in the eye's of the beholder.  For single user systems,
what you do to yourself is between the three of you.  For
sites that support communities of which you have to
presume at least a few compromised credentials, even
a local DOS might be significant, or require actions.  As
with all else, details matter (if anyone can do it with
a `/bin/ls` it is much more potentially impactful to a site
than if it requires a full moon, high tide, and a leap second
to reproduce).

So I would suggest that even local DOS deserves advisories
(with any possible mitigations/workarounds), but not a
software release/patch (i.e. "addressed in a future release").

Gary
_______________________________________________
OpenAFS-info mailing list
OpenAFS-info@openafs.org
https://lists.openafs.org/mailman/listinfo/openafs-info

Reply via email to