this post was submitted on 06 Dec 2023
330 points (96.1% liked)

Linux

48378 readers
1006 users here now

From Wikipedia, the free encyclopedia

Linux is a family of open source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991 by Linus Torvalds. Linux is typically packaged in a Linux distribution (or distro for short).

Distributions include the Linux kernel and supporting system software and libraries, many of which are provided by the GNU Project. Many Linux distributions use the word "Linux" in their name, but the Free Software Foundation uses the name GNU/Linux to emphasize the importance of GNU software, causing some controversy.

Rules

Related Communities

Community icon by Alpár-Etele Méder, licensed under CC BY 3.0

founded 5 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] kelvie@lemmy.ca 7 points 11 months ago (1 children)

So I don't get it, I have my entire boot image in a signed EFI binary, the logo is in there as well. I don't think I'm susceptible to this, right? I don't think systemd-boot or the kernel reads an unsigned logo file anywhere. (Using secure boot)

[–] clmbmb@lemmy.dbzer0.com 13 points 11 months ago (1 children)

This is way before reaching your bootloader. It's about the manufacturer logo that's displayed by UEFI while doing the whole hardware initialization.

[–] kelvie@lemmy.ca 6 points 11 months ago (1 children)

That's.... Stored in the EFI partition or changeable in userspace?

[–] clmbmb@lemmy.dbzer0.com 1 points 11 months ago (1 children)

Depending on how the UEFI is configured, a simple copy/paste command, executed either by the malicious image or with physical access, is in many cases all that’s required to place the malicious image into what’s known as the ESP, short for EFI System Partition, a region of the hard drive that stores boot loaders, kernel images, and any device drivers, system utilities, or other data files needed before the main OS loads.

(from the article)

[–] kelvie@lemmy.ca 1 points 11 months ago

Right, I know EFI images are stored in the EFI partition, but with secure boot, only signed images can be executed, so they'd need to steal someone's signing key to do this.