• @Static_Rocket
    link
    English
    87
    edit-2
    1 year ago

    The most useful quote to those familiar with the linux boot process:

    “An attacker would need to be able to coerce a system into booting from HTTP if it’s not already doing so, and either be in a position to run the HTTP server in question or MITM traffic to it,” Matthew Garrett, a security developer and one of the original shim authors, wrote in an online interview. “An attacker (physically present or who has already compromised root on the system) could use this to subvert secure boot (add a new boot entry to a server they control, compromise shim, execute arbitrary code).”

    If an attack needs root then it doesn’t matter. Your box is toast anyway. If you’re using http boot without verification then you should have seen a MITM attack coming.

    • @ShittyBeatlesFCPres
      link
      English
      541 year ago

      I only let attackers with root privileges execute arbitrary code on my guest WiFi so I’m good.

  • LinusWorks4Mo
    link
    fedilink
    231 year ago

    clickbait title. basically, if your machine is already compromised in a severe way, here is another way how to compromise it further (for whatever reason)

    • @[email protected]
      link
      fedilink
      English
      101 year ago

      I for one appreciate the switcheroo, and can only imagine “being butthurt” as the reason you got downvoted.

  • Kalkaline
    link
    fedilink
    English
    -251 year ago

    I don’t know that I’ve actually heard of a Linux vulnerability before, but especially not this bad. It was a good streak and I’m sure it will be patched quickly.

      • Kalkaline
        link
        fedilink
        English
        81 year ago

        I guess I’ve still never heard of a major Linux vulnerability then.

        • @kn33
          link
          English
          61 year ago

          Then you haven’t been paying attention

    • @geekworking
      link
      English
      311 year ago

      This flaw is not really that bad because it requires the attacker to already have total and complete control over the system already. For example, if they were able to steal the root password.

      This flaw just makes it easier for the attacker to hide and harder to evict them.