Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <ZczhrQT3b1y6c5Dy@corsac.net>
Date: Wed, 14 Feb 2024 16:52:13 +0100
From: Yves-Alexis Perez <corsac@...ian.org>
To: Mate Kukri <mate.kukri@...onical.com>
Cc: oss-security@...ts.openwall.com
Subject: Re: Secure Boot bypass in EDK2 based Virtual Machine
 firmware

On Wed, Feb 14, 2024 at 03:47:23PM +0000, Mate Kukri wrote:
> That is correct in the general case, but here the issue comes from the
> fact that a copy of the Shell was included in the firmware image
> itself, and as a built-in application was implicitly trusted.

Ah, thanks for the clarification, I didn't know about the implicit trust
on "built-in applications". Out of curiosity, are there other such
applications, which could be abused?

Regards,
-- 
Yves-Alexis Perez

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.