Les machines Framework sous Linux vulnérables : attention aux bootkits

Plus de 200 000 machines Framework sous Linux ont été livrées avec un UEFI vulnérable qui met en péril le Secure Boot : les bootkits peuvent en profiter.

IT-Connect
Les bootkits peuvent contourner le Secure Boot avec cette faille !

Une vulnérabilité permettant de contourner la protection UEFI Secure Boot des machines a été découverte : CVE-2024-7344. Voici ce que vous devez savoir.

IT-Connect

Researchers have identified “Bootkitty,” the first known UEFI bootkit developed to target Linux systems. #cybersecurity #linux #bootkitty #ESET #malware #bootkits

https://buff.ly/4eTjEHi

@theregister that's not enough!

#Microsoft must #ban #Rootkits / #Bootkits and #Lernel-level #drivers entirely or #Windows will get banned amidst it's unfixable security!

@bedast My problem is that these people refuse to take the correct consequences and migrate away from garbage:

  • You just don't install such garbage on #Unix-esque Systems like #Linux!

  • #CrowdStrike is just yet another #Scareware #Scam.

  • The entire business model of #AntiVirus and other Scareware shouldn't exist to begin with.

  • 3rd party #BinaryBlobs on a non-#FLOSS'd kernel are just bad!

  • It should be #Microsoft's sole tesponsibility to just not allow #Rootkits / #Bootkits like that to exist eith their blessing aka. #Signature on.

  • #Windows & #WindowsServer are unbelieveably #cursed and unmaintainable mess that'll make even #Solaris 7 look clean and sleek.

  • The diversity of Linux and Unix-esque distros like #BSD's make it basically impossible to bmhave such a giant and direct effect.

  • The whole issue should've been avoided throug extensive testing because it's certainly so rampant that it would've been picked up by #QA testers.

  • The fuckedup-ness of #CensorBoot aka. "#SecureBoot" (which is insecure af - see #GoldenKeyBoot!) is the reason why this results in such catastrophic failures, whereas on #Linux one just uses #LUKS and can easily recover files.

  • Most Windows users & -#sysadmins neglect #Backups of Windows machines because there is no good way to backup them!

  • 3rd party kernel binaryblobs are #malware, regardless if "Anti-Malware" or "#AntiCheat" is the claimed functionality.

  • If I don't trust #WindowsDefender then I don't trust Windows or rather Microsoft and thus have to cease using it!

  • This shit would not have been possible under Linux!

  • Matthew Garrett (@[email protected])

    "Linux would have prevented this!" literally true because my former colleague KP Singh wrote a kernel security module that lets EDR implementations load ebpf into the kernel to monitor and act on security hooks and Crowdstrike now uses that rather than requiring its own kernel module that would otherwise absolutely have allowed this to happen, so everyone please say thank you to him

    Nondeterministic Computer
    Critical #vulnerability affecting most #Linux distros allows for #bootkits https://arstechnica.com/?p=2001542
    Critical vulnerability affecting most Linux distros allows for bootkits

    Buffer overflow in bootloader shim allows attackers to run code each time devices boot up.

    Ars Technica
    Critical Vulnerability Affecting Most Linux Distros Allows For Bootkits - Slashdot

    Linux developers are in the process of patching a high-severity vulnerability that, in certain cases, allows the installation of malware that runs at the firmware level, giving infections access to the deepest parts of a device where they're hard to detect or remove. ArsTechnica: The vulnerability r...

    The #LogoFail #UEFI #exploit is a perfect example of how capitalism fucks everything up. So many people worked so hard on securing UEFI against #bootkits but having a goddamn image load was necessary for capitalist "intellectual property" to be enforced, thus opening this vulnerability for literally every Windows and Linux system with a hardware manufacturer logo loading in boot, which is most of them. https://arstechnica.com/security/2023/12/just-about-every-windows-and-linux-device-vulnerable-to-new-logofail-firmware-attack/

    This isn't a security fail, it's a #capitalism fail, because the social/legal regime of #intellectualproperty is actually unnecessary and oppressive, and in this case prevented people from designing secure systems.

    Just about every Windows and Linux device vulnerable to new LogoFAIL firmware attack

    UEFIs booting Windows and Linux devices can be hacked by malicious logo images.

    Ars Technica
    "Multiple security #vulnerabilities collectively named #LogoFAIL affect image-parsing components in the #UEFI code from various vendors. Researchers warn that they could be exploited to hijack the execution flow of the booting process and to deliver #bootkits." #CyberSecurity #firmware
    https://www.bleepingcomputer.com/news/security/logofail-attack-can-install-uefi-bootkits-through-bootup-logos/
    LogoFAIL attack can install UEFI bootkits through bootup logos

    Multiple security vulnerabilities collectively named LogoFAIL affect image-parsing components in the UEFI code from various vendors. Researchers warn that they could be exploited to hijack the execution flow of the booting process and to deliver bootkits.

    BleepingComputer

    Des millions de PC équipés d’une carte mère Gigabyte sont vulnérables à cause d’une backdoor

    #gigabyte #PC #backdoors #firmware #backdoor #rootkits #bootkits #BIOS #UEFI

    https://lsdm.live/modules/news/article.php?storyid=4069