• Static_Rocket@lemmy.world
    link
    fedilink
    English
    arrow-up
    87
    ·
    edit-2
    5 months ago

    The most useful quote to those familiar with the linux boot process:

    “An attacker would need to be able to coerce a system into booting from HTTP if it’s not already doing so, and either be in a position to run the HTTP server in question or MITM traffic to it,” Matthew Garrett, a security developer and one of the original shim authors, wrote in an online interview. “An attacker (physically present or who has already compromised root on the system) could use this to subvert secure boot (add a new boot entry to a server they control, compromise shim, execute arbitrary code).”

    If an attack needs root then it doesn’t matter. Your box is toast anyway. If you’re using http boot without verification then you should have seen a MITM attack coming.

  • LinusWorks4Mo@kbin.social
    link
    fedilink
    arrow-up
    23
    ·
    5 months ago

    clickbait title. basically, if your machine is already compromised in a severe way, here is another way how to compromise it further (for whatever reason)

  • Zip2
    link
    fedilink
    English
    arrow-up
    21
    arrow-down
    7
    ·
    5 months ago

    Just uninstall it and install Windows instead.

    • KairuByte@lemmy.dbzer0.com
      link
      fedilink
      English
      arrow-up
      11
      arrow-down
      1
      ·
      5 months ago

      I for one appreciate the switcheroo, and can only imagine “being butthurt” as the reason you got downvoted.

  • Kalkaline @leminal.space
    link
    fedilink
    English
    arrow-up
    5
    arrow-down
    29
    ·
    5 months ago

    I don’t know that I’ve actually heard of a Linux vulnerability before, but especially not this bad. It was a good streak and I’m sure it will be patched quickly.

    • geekworking@lemmy.world
      link
      fedilink
      English
      arrow-up
      31
      ·
      5 months ago

      This flaw is not really that bad because it requires the attacker to already have total and complete control over the system already. For example, if they were able to steal the root password.

      This flaw just makes it easier for the attacker to hide and harder to evict them.