Why is the "Scope Changed" CVSS Metric for Kernel Crash Vectors always "Unchanged"? [closed]

Looking at all the recent Linux kernel crash CVEs I see that the "Scope Changed" metric is always "Unchanged" indicating that "The vulnerable component is the affected component".
My question is, why wouldn’t … Continue reading Why is the "Scope Changed" CVSS Metric for Kernel Crash Vectors always "Unchanged"? [closed]

Why is the "Scope Changed" CVSS Metric for Kernel Crash Vectors always "Unchanged"? [closed]

Looking at all the recent Linux kernel crash CVEs I see that the "Scope Changed" metric is always "Unchanged" indicating that "The vulnerable component is the affected component".
My question is, why wouldn’t … Continue reading Why is the "Scope Changed" CVSS Metric for Kernel Crash Vectors always "Unchanged"? [closed]

How relevant are OS security measures for everyday single-user personal computers? [closed]

For example, Meltdown and Spectre are serious security issues since they allow application to read unauthorized memory. However, from my understanding, most everyday computer setup allow any untrusted code to read personal files.
So are th… Continue reading How relevant are OS security measures for everyday single-user personal computers? [closed]

Will installing a kernel mode driver onto a PC compromise the entire network it’s connected to?

At home, my personal PC and work computers all connect to the same network, via ethernet and WiFi.
A video game on my personal PC is requiring an install of a "kernel mode driver." At the risk of asking the obvious,

Can this com… Continue reading Will installing a kernel mode driver onto a PC compromise the entire network it’s connected to?

Want to know about Virtual Machine Based Rootkit (Subvirt & Blue Pill rootkits) [closed]

I am testing this VMBR concept in my environment (for research purposes).
Since I am very new to this concept, want to understand how this VMBR or Subvirt and Bluepill can be implemented; is it possible?
and
To start, I am working with CoV… Continue reading Want to know about Virtual Machine Based Rootkit (Subvirt & Blue Pill rootkits) [closed]

Does emulation/software virtualization provide more isolation/security vs hardware virtualization?

From my understanding:

I can emulate many different architectures and systems with qemu as a user(mode) process.
There is separate user address space per process.
If a malicious process were to escape emulation it could compromise the use… Continue reading Does emulation/software virtualization provide more isolation/security vs hardware virtualization?