[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: An example of hardware/software vulns - GPUs



On 07/13/2017 07:08 AM, Millar, Thomas wrote:
> What is the scope constraint for hardware vulnerabilities? Dropping 
> iOS
> devices in most fluids leads to a DoS condition.
Did the manufacturer make a claim that they are waterproof (IP67/IP68,
or specifically ISO 22810:2010 for watches)? If so then yes, that would
be a problem if they were not actually water proof, then it becomes a
discussion of attack vectors/etc (at some point physical possession ==
throw it into the fires of Mount Mordor to destroy it) to which I'm not
sure if stealing a device and subsequent damage for example is valid.

> 
> Tom Millar, US-CERT
> 
> Sent from +1-202-631-1915
> https://www.us-cert.gov *



-- 

Kurt Seifried -- Red Hat -- Product Security -- Cloud
PGP A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993
Red Hat Product Security contact: secalert@redhat.com


Page Last Updated or Reviewed: July 13, 2017