• Nibodhika@lemmy.world
    link
    fedilink
    arrow-up
    133
    arrow-down
    2
    ·
    5 months ago

    I love how every time I read a “Critical” vulnerability in Linux it’s essentially “The user must leave their computer completely unlocked in an accessible area for a long period of time. Also he needs this very specific combination of programs running in these specific versions. Ah, and the planets have to be aligned for it to work. If all of these happen, an attacker might glimpse at your desktop wallpaper, so definitely critical”.

  • dsemy@lemm.ee
    link
    fedilink
    English
    arrow-up
    63
    ·
    5 months ago

    This is a vulnerability in shim, which is a UEFI “bootloader” used by distros mainly to allow booting with the “stock” (Microsoft) secure boot keys.

    If you don’t use secure boot or don’t use shim (likely if you use your own keys), this doesn’t affect you at all.

    In any case this “critical vulnerability” mainly affects machines relying on shim which also boot over unencrypted HTTP.

    • alliswell33 @lemmy.sdf.org
      link
      fedilink
      arrow-up
      8
      ·
      edit-2
      5 months ago

      Would this affect systems booting to the refind bootloader without secure boot? Sorry for the ignorance just trying to figure out if I should be changing my system for this news.

      • Jordan_U@lemmy.ml
        link
        fedilink
        arrow-up
        5
        ·
        5 months ago

        No.

        This is a vulnerability which allows bypassing secure boot protections. You have already manually bypassed those protections by disabling secure boot.

  • LinusWorks4Mo@kbin.social
    link
    fedilink
    arrow-up
    62
    ·
    5 months ago

    clickbait title. basically, if your machine is already compromised in a severe way, here is another way how to compromise it further (for whatever reason)

    • nyan@lemmy.cafe
      link
      fedilink
      English
      arrow-up
      11
      ·
      5 months ago

      And the issue that does exist doesn’t even require Linux to be installed, technically. Unless you’re an IT pro administering large numbers of systems that boot from a network disk image, there is nothing for you to worry about here.

  • bizdelnick@lemmy.ml
    link
    fedilink
    arrow-up
    28
    ·
    edit-2
    5 months ago

    I wonder if Matt calculated CVSS score before calling this vulnerability “critical”.

  • gorysubparbagel@lemmy.world
    cake
    link
    fedilink
    arrow-up
    8
    ·
    edit-2
    5 months ago

    2 scenarios where it can be exploited:

    Acquiring the ability to compromise a server or perform an adversary-in-the-middle impersonation of it to target a device that’s already configured to boot using HTTP

    Already having physical access to a device or gaining administrative control by exploiting a separate vulnerability.