Navigation
Search
|
Secure Boot Bypass Risk Threatens Nearly 200,000 Linux Framework Laptops
Wednesday October 15, 2025. 03:25 AM , from Slashdot
![]() The mm command can be abused to overwrite gSecurity2 with NULL, effectively disabling signature verification. 'This command writes zeros to the memory location containing the security handler pointer, effectively disabling signature verification for all subsequent module loads.' The researchers also note that the attack can be automated via startup scripts to persist across reboots. Read more of this story at Slashdot.
https://it.slashdot.org/story/25/10/14/2123205/secure-boot-bypass-risk-threatens-nearly-200000-linux...
Related News |
25 sources
Current Date
Oct, Wed 15 - 09:52 CEST
|