|
Message-ID: <ZczhrQT3b1y6c5Dy@corsac.net> Date: Wed, 14 Feb 2024 16:52:13 +0100 From: Yves-Alexis Perez <corsac@...ian.org> To: Mate Kukri <mate.kukri@...onical.com> Cc: oss-security@...ts.openwall.com Subject: Re: Secure Boot bypass in EDK2 based Virtual Machine firmware On Wed, Feb 14, 2024 at 03:47:23PM +0000, Mate Kukri wrote: > That is correct in the general case, but here the issue comes from the > fact that a copy of the Shell was included in the firmware image > itself, and as a built-in application was implicitly trusted. Ah, thanks for the clarification, I didn't know about the implicit trust on "built-in applications". Out of curiosity, are there other such applications, which could be abused? Regards, -- Yves-Alexis Perez
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.