this post was submitted on 07 Feb 2024
89 points (91.6% liked)

Linux

47290 readers
715 users here now

From Wikipedia, the free encyclopedia

Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991 by Linus Torvalds. Linux is typically packaged in a Linux distribution (or distro for short).

Distributions include the Linux kernel and supporting system software and libraries, many of which are provided by the GNU Project. Many Linux distributions use the word "Linux" in their name, but the Free Software Foundation uses the name GNU/Linux to emphasize the importance of GNU software, causing some controversy.

Rules

Related Communities

Community icon by Alpár-Etele Méder, licensed under CC BY 3.0

founded 5 years ago
MODERATORS
top 22 comments
sorted by: hot top controversial new old
[–] Nibodhika@lemmy.world 66 points 7 months ago (1 children)

I love how every time I read a "Critical" vulnerability in Linux it's essentially "The user must leave their computer completely unlocked in an accessible area for a long period of time. Also he needs this very specific combination of programs running in these specific versions. Ah, and the planets have to be aligned for it to work. If all of these happen, an attacker might glimpse at your desktop wallpaper, so definitely critical".

[–] tourist@lemmy.world 26 points 7 months ago (2 children)

not trying to sound like an internet badass but if I find someone in my home fucking with my config files I will kill them with a hammer

[–] Scio@kbin.social 12 points 7 months ago (2 children)

I would at the very least break their fingers if they touch my keyboard.

No hammer needed...

[–] SAF77@lemmy.world 2 points 7 months ago (1 children)

But I bet it's more fun with a hammer.

[–] MyNameIsRichard@lemmy.ml 1 points 7 months ago (1 children)

But you could damage the keyboard

[–] SheeEttin@programming.dev 1 points 7 months ago

Not my Model M.

[–] cyberic@discuss.tchncs.de 2 points 7 months ago (1 children)

This made me think of a custom keyboard with a mousetrap arm at the top to break the fingers of would-be typers.

[–] Rustmilian@lemmy.world 1 points 7 months ago

Mousetrap keyboard + Suicide Linux

My first reaction would be to acknowledge them as a fellow geek, but that's because most of the people who live near me would hurt themselves trying to open Notepad. Anyone who knows enough to start hacking my config files would be a welcome guest in my house.

Then I'd kill them with a hammer. :-)

[–] dsemy@lemm.ee 44 points 7 months ago (1 children)

This is a vulnerability in shim, which is a UEFI "bootloader" used by distros mainly to allow booting with the "stock" (Microsoft) secure boot keys.

If you don't use secure boot or don't use shim (likely if you use your own keys), this doesn't affect you at all.

In any case this "critical vulnerability" mainly affects machines relying on shim which also boot over unencrypted HTTP.

[–] alliswell33@lemmy.sdf.org 5 points 7 months ago* (last edited 7 months ago) (2 children)

Would this affect systems booting to the refind bootloader without secure boot? Sorry for the ignorance just trying to figure out if I should be changing my system for this news.

[–] dsemy@lemm.ee 4 points 7 months ago
[–] Jordan_U@lemmy.ml 1 points 7 months ago

No.

This is a vulnerability which allows bypassing secure boot protections. You have already manually bypassed those protections by disabling secure boot.

[–] LinusWorks4Mo@kbin.social 17 points 7 months ago (2 children)

clickbait title. basically, if your machine is already compromised in a severe way, here is another way how to compromise it further (for whatever reason)

[–] nyan@lemmy.cafe 4 points 7 months ago

And the issue that does exist doesn't even require Linux to be installed, technically. Unless you're an IT pro administering large numbers of systems that boot from a network disk image, there is nothing for you to worry about here.

[–] psud@lemmy.world 2 points 7 months ago

It's also a new way to compromise a machine you have physical access to

[–] bizdelnick@lemmy.ml 16 points 7 months ago* (last edited 7 months ago) (1 children)

I wonder if Matt calculated CVSS score before calling this vulnerability "critical".

[–] folkrav@lemmy.ca 2 points 7 months ago* (last edited 7 months ago) (1 children)

It’s the last sentence of the article - 9.8/10. In this case it’s probably called critical because of the potential consequences of the exploit being a full machine takeover, not the likeliness of the exploit being used.

[–] bizdelnick@lemmy.ml 1 points 7 months ago

It means that CVSS is calculated wrong. It can't be so big because default configuration is not affected and attacker requires admin access to change it.

[–] autotldr@lemmings.world 14 points 7 months ago (1 children)

This is the best summary I could come up with:


Linux developers are in the process of patching a high-severity vulnerability that, in certain cases, allows the installation of malware that runs at the firmware level, giving infections access to the deepest parts of a device where they’re hard to detect or remove.

The vulnerability resides in shim, which in the context of Linux is a small component that runs in the firmware early in the boot process before the operating system has started.

While these hurdles are steep, they’re by no means impossible, particularly the ability to compromise or impersonate a server that communicates with devices over HTTP, which is unencrypted and requires no authentication.

These particular scenarios could prove useful if an attacker has already gained some level of access inside a network and is looking to take control of connected end-user devices.

In that case, the attacker would first have to forge the digital certificate the server uses to prove it’s authorized to provide boot firmware to devices.

And, of course, already obtaining administrative control through exploiting a separate vulnerability in the operating system is hard and allows attackers to achieve all kinds of malicious objectives.


The original article contains 493 words, the summary contains 189 words. Saved 62%. I'm a bot and I'm open source!

[–] mranderson17@infosec.pub 21 points 7 months ago (1 children)

“An attacker would need to be able to coerce a system into booting from HTTP if it's not already doing so, and either be in a position to run the HTTP server in question or MITM traffic to it,” - Matthew Garrett

Summary left out a quite important bit.

[–] Quazatron@lemmy.world 3 points 7 months ago

Security people sure are an enthusiastic bunch of fellows.