Much ado about SBAT
Much ado about SBAT
Posted Jul 21, 2023 19:16 UTC (Fri) by nijhof (subscriber, #4034)In reply to: Much ado about SBAT by bluca
Parent article: Much ado about SBAT
Posted Jul 21, 2023 20:11 UTC (Fri)
by pjones (subscriber, #31722)
[Link] (1 responses)
Posted Jul 25, 2023 19:35 UTC (Tue)
by DemiMarie (subscriber, #164188)
[Link]
Much ado about SBAT
There are also many, many privilege escalation vulnerabilities with the same result. That’s why forbidding kernel downgrades within a stable release series really is the only answer that can be supported upstream. The attack surface of the upstream kernel is just too broad to be able to do otherwise. Downstreams can shrink the attack surface massively by disabling kernel features not in use and by preventing unsigned privileged userspace code from running, but upstream cannot do either.
Kernel memory corruption is a secure boot bypass