[Ksummit-2012-discuss] [ATTEND] ACPI, UEFI, kernel security
mjg59 at srcf.ucam.org
Wed Jun 27 17:34:07 UTC 2012
On Wed, Jun 27, 2012 at 07:28:40PM +0200, Jiri Kosina wrote:
> It's not an exception when kernel security vulnerability gives the
> attacker the possibility to overwrite arbitrary memory locations. As UEFI
> secure boot is apparently not able to provide any
> protection/countermeasure against this, I am really wondering what it is
> good for in reality.
If our assumption is that the kernel is insecure, what's the point of
any level of local security?
Matthew Garrett | mjg59 at srcf.ucam.org
More information about the Ksummit-2012-discuss