[Ksummit-2012-discuss] [ATTEND] ACPI, UEFI, kernel security

Matthew Garrett mjg59 at srcf.ucam.org
Wed Jun 27 17:34:07 UTC 2012


On Wed, Jun 27, 2012 at 07:28:40PM +0200, Jiri Kosina wrote:

> It's not an exception when kernel security vulnerability gives the 
> attacker the possibility to overwrite arbitrary memory locations. As UEFI 
> secure boot is apparently not able to provide any 
> protection/countermeasure against this, I am really wondering what it is 
> good for in reality.

If our assumption is that the kernel is insecure, what's the point of 
any level of local security?

-- 
Matthew Garrett | mjg59 at srcf.ucam.org


More information about the Ksummit-2012-discuss mailing list