Navigation
Recherche
|
Secure Boot Bypass Risk Threatens Nearly 200,000 Linux Framework Laptops
mercredi 15 octobre 2025, 03:25 , par Slashdot
![]() The mm command can be abused to overwrite gSecurity2 with NULL, effectively disabling signature verification. 'This command writes zeros to the memory location containing the security handler pointer, effectively disabling signature verification for all subsequent module loads.' The researchers also note that the attack can be automated via startup scripts to persist across reboots. Read more of this story at Slashdot.
https://it.slashdot.org/story/25/10/14/2123205/secure-boot-bypass-risk-threatens-nearly-200000-linux...
Voir aussi |
56 sources (32 en français)
Date Actuelle
mer. 15 oct. - 11:51 CEST
|