Shim vulnerability exposes most Linux systems to attack (www.zdnet.com)
from yogthos@lemmy.ml to linux@lemmy.ml on 18 Feb 2024 14:02
https://lemmy.ml/post/12078146

#linux

threaded - newest

HumanPerson@sh.itjust.works on 18 Feb 2024 16:42 next collapse

So if someone breaks into my house and gets access to my device and another device on my network to execute a man in the middle attack, they could bypass secureboot which I don’t use anyway? Because I’m okay with that.

Sims@lemmy.ml on 18 Feb 2024 19:17 collapse

Because I’m okay with that.

You daredevil you - LIVING ON THE EDGE ! ;-)

LainTrain@lemmy.dbzer0.com on 18 Feb 2024 17:13 next collapse

Even more non-news than the TPM thing

fl42v@lemmy.ml on 18 Feb 2024 20:25 next collapse

Given you need physical access (afaiu), there’s an easier root route: you come with a flash drive that also has shim, boot from it, and do whatever you wanted to do.

Now if you don’t want whoever to be able to bypass suckure boot, you remove microshit’s keys and install your own ones. Coincidentally, you don’t really need a crutch - that is shim - in that case.

ProgrammingSocks@pawb.social on 19 Feb 2024 01:06 collapse

Every fucking time. “Critical security problem with all Linux machines!!!” Turns out you need physical access and the ability to program tools that don’t exist yet

possiblylinux127@lemmy.zip on 19 Feb 2024 02:26 collapse

The author sounds like they don’t fully understand Linux or how Linux boots.

Anyone can just boot off of a USB or remove and modify the disk. The really protection for Linux is full disk encryption with a strong password.