Much ado about SBAT
Much ado about SBAT
Posted Jul 21, 2023 20:11 UTC (Fri) by pjones (subscriber, #31722)In reply to: Much ado about SBAT by nijhof
Parent article: Much ado about SBAT
Posted Jul 25, 2023 19:35 UTC (Tue)
by DemiMarie (subscriber, #164188)
[Link]
There are also many, many privilege escalation vulnerabilities with the same result. That’s why forbidding kernel downgrades within a stable release series really is the only answer that can be supported upstream. The attack surface of the upstream kernel is just too broad to be able to do otherwise. Downstreams can shrink the attack surface massively by disabling kernel features not in use and by preventing unsigned privileged userspace code from running, but upstream cannot do either.
Kernel memory corruption is a secure boot bypass