Security Snippets: Linux systems exposed to boot loader attack

Hogan Lovells
Contact

Hogan Lovells

New vulnerability found in the boot process for Linux systems configured to boot over the network.


A high severity vulnerability could allow attackers to take over a Linux system. The vulnerability is in the shim software that supports Secure Boot, which is a standard that certain Linux distributions use to ensure that devices boot only with trusted software from the original equipment manufacturer.

Shim parses HTTP responses, which attackers can exploit to execute privileged code and circumvent any controls implemented by the kernel and the operating system. This flaw is only exploitable in the early boot phrase by attackers who perform a Man-in-the-Middle attack, alter the boot order using existing privileges, or use a preboot execution environment. It is only exploitable for systems that are configured to load the boot loader over the network, which is typically only large data centers.

To prevent against this risk, IT teams utilizing this boot configuration can update the Secure Boot chain of trust and update to new patched versions of shim.

[View source.]

DISCLAIMER: Because of the generality of this update, the information provided herein may not be applicable in all situations and should not be acted upon without specific legal advice based on particular situations.

© Hogan Lovells | Attorney Advertising

Written by:

Hogan Lovells
Contact
more
less

Hogan Lovells on:

Reporters on Deadline

"My best business intelligence, in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
Custom Email Digest
- hide
- hide