LinuxQuestions.org
Download your favorite Linux distribution at LQ ISO.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Hardware
User Name
Password
Linux - Hardware This forum is for Hardware issues.
Having trouble installing a piece of hardware? Want to know if that peripheral is compatible with Linux?

Notices


Reply
  Search this Thread
Old 12-06-2023, 12:12 PM   #1
jailbait
LQ Guru
 
Registered: Feb 2003
Location: Virginia, USA
Distribution: Debian 12
Posts: 8,341

Rep: Reputation: 551Reputation: 551Reputation: 551Reputation: 551Reputation: 551Reputation: 551
UEFIs booting Windows and Linux devices can be hacked


There is a new security threat against every computer that uses UEFI.

https://arstechnica.com/security/202...rmware-attack/

Can the threat be avoided by switching to legacy BIOS?

Last edited by jailbait; 12-06-2023 at 12:15 PM.
 
Old 12-06-2023, 02:05 PM   #2
TB0ne
LQ Guru
 
Registered: Jul 2003
Location: Birmingham, Alabama
Distribution: SuSE, RedHat, Slack,CentOS
Posts: 26,705

Rep: Reputation: 7972Reputation: 7972Reputation: 7972Reputation: 7972Reputation: 7972Reputation: 7972Reputation: 7972Reputation: 7972Reputation: 7972Reputation: 7972Reputation: 7972
Quote:
Originally Posted by jailbait View Post
There is a new security threat against every computer that uses UEFI.

https://arstechnica.com/security/202...rmware-attack/

Can the threat be avoided by switching to legacy BIOS?
The security threat that's a proof of concept, developed by researchers??? Probably not, since the article specifically outlines how it works. And that the vulnerable systems have already been identified and patches are rolling out to counter it. From the article itself:
Quote:
Originally Posted by Article
The affected parties are releasing advisories that disclose which of their products are vulnerable and where to obtain security patches.
Lots of proof-of-concept attacks are out there...hardly any ever make it 'into the wild', because they're just too clunky to deploy, as this one is. Because in order for this to work, you'd have to update your existing BIOS with one that has the exploit in it.

So yes...if you're going to download an update to your system from some sketchy third party without verification and shove it on your system, it could work.
 
Old 12-06-2023, 02:21 PM   #3
smallpond
Senior Member
 
Registered: Feb 2011
Location: Massachusetts, USA
Distribution: Fedora
Posts: 4,153

Rep: Reputation: 1265Reputation: 1265Reputation: 1265Reputation: 1265Reputation: 1265Reputation: 1265Reputation: 1265Reputation: 1265Reputation: 1265
Need to start pushing vendors to use open source firmware. https://www.coreboot.org/users.html
 
1 members found this post helpful.
Old 12-06-2023, 02:43 PM   #4
wpeckham
LQ Guru
 
Registered: Apr 2010
Location: Continental USA
Distribution: Debian, Ubuntu, RedHat, DSL, Puppy, CentOS, Knoppix, Mint-DE, Sparky, VSIDO, tinycore, Q4OS, Manjaro
Posts: 5,695

Rep: Reputation: 2716Reputation: 2716Reputation: 2716Reputation: 2716Reputation: 2716Reputation: 2716Reputation: 2716Reputation: 2716Reputation: 2716Reputation: 2716Reputation: 2716
Quote:
Originally Posted by smallpond View Post
Need to start pushing vendors to use open source firmware. https://www.coreboot.org/users.html
Most users never install firmware updates anyway (though they really should), but that would be a good start. Making them load as a boot option (ala Dell laptops) would also help and would make them OS agnostic.
 
Old 12-06-2023, 05:29 PM   #5
rkelsen
Senior Member
 
Registered: Sep 2004
Distribution: slackware
Posts: 4,463
Blog Entries: 7

Rep: Reputation: 2561Reputation: 2561Reputation: 2561Reputation: 2561Reputation: 2561Reputation: 2561Reputation: 2561Reputation: 2561Reputation: 2561Reputation: 2561Reputation: 2561
Quote:
Originally Posted by TB0ne View Post
The security threat that's a proof of concept, developed by researchers???
Exactly.

From the article: "There are several ways to exploit LogoFAIL. Remote attacks work by first exploiting an unpatched vulnerability in a browser, media player, or other app and using the administrative control gained to replace the legitimate logo image processed early in the boot process with an identical-looking one that exploits a parser flaw. The other way is to gain brief access to a vulnerable device while it’s unlocked and replace the legitimate image file with a malicious one."

Breaking that down:
1. It requires administrator level access to your machine.
2. To obtain administrator level access to your machine, it needs: "an unpatched vulnerability in a browser, media player, or other app."

Those are high bars to jump over, particularly in this day & age.

Under Linux, you can prevent this by not using the root account for day-to-day tasks. On Windows, you can achieve a similar result by setting up a 'standard user' account for yourself... but almost nobody does that.

There are other reasons to not be worried about this, too, but I don't have time to write them all out because I've got work to do.
 
Old 12-07-2023, 11:16 AM   #6
jayjwa
Member
 
Registered: Jul 2003
Location: NY
Distribution: Slackware, Termux
Posts: 792

Rep: Reputation: 252Reputation: 252Reputation: 252
If I'm reading this correctly, an attacker needs read/write access to the ESP, something only root has. Then, you have to download and install a compromised image (as in picture), and hope a vulnerable EFI loader parses it to launch the attack. In short, you have to do a part firmware update, assuming you even had a logo to begin with, for a compromised logo to be installed.

Looks like someone at Binarly wanted to justify almost a year's worth of work and Arstechnica ran with this hair-on-fire story.
 
Old 12-07-2023, 12:54 PM   #7
Ser Olmy
Senior Member
 
Registered: Jan 2012
Distribution: Slackware
Posts: 3,345

Rep: Reputation: Disabled
The story here is that the image processing code in numerous UEFI BIOSes contain vulnerabilities that can only be characterised as ridiculous.

I have a really hard time believing that the programmers of these supposedly secure systems just had no idea that you have to properly validate input data in order to prevent vulnerabilities of this kind. Either an awful lot of programmers at an awful lot of billion-dollar companies are completely incompetent, or this is (or rather, was) intended as a backdoor.
 
Old 12-07-2023, 01:55 PM   #8
boughtonp
Senior Member
 
Registered: Feb 2007
Location: UK
Distribution: Debian
Posts: 3,616

Rep: Reputation: 2555Reputation: 2555Reputation: 2555Reputation: 2555Reputation: 2555Reputation: 2555Reputation: 2555Reputation: 2555Reputation: 2555Reputation: 2555Reputation: 2555

Profitability doesn't require competence, and there are only three BIOS vendors involved.

Not that I'd rule out a deliberate backdoor, but it really doesn't surprise me.

In addition to simply being the work of an average incompetent developer, I can easily imagine "display an image" being a task given to an intern who has yet to learn anything meaningful about security, and it could also be "here's a quick and dirty version to start with, we'll replace it before launch" that, once an arbitrary deadline approaches, a non-developer project manager declares as good enough.

 
Old 12-21-2023, 03:23 PM   #9
SunnyJim
Member
 
Registered: Jan 2016
Location: Canada
Distribution: slackware and linux mint
Posts: 110

Rep: Reputation: Disabled
One must also consider other known exploits that are built in like intel v-pro active management technology or amd psp that are touted as a "feature" that you should want, built in back doors
in your hardware along with the telemetry riddled buggy ms windows variants. Also Linus Torvalds was approached by intelligence operatives and asked to put in backdoors into his kernel
and refused. Here you have a group of people (the intelligence community) that don't want to work too hard to do their jobs and end up making things less secure in the end while positing that
they are "just trying to protect you". From who them? When these guys keep getting caught doing things nobody else would get away with i start questioning the narrative.
Yeah i did a search on this logofail exploit and found this thread so i at least know the linux community is looking at it so that much is good. What do we have to do anyway make our own hardware
along with our software like apple so we can have more secure computers?
 
Old 12-22-2023, 12:01 PM   #10
wpeckham
LQ Guru
 
Registered: Apr 2010
Location: Continental USA
Distribution: Debian, Ubuntu, RedHat, DSL, Puppy, CentOS, Knoppix, Mint-DE, Sparky, VSIDO, tinycore, Q4OS, Manjaro
Posts: 5,695

Rep: Reputation: 2716Reputation: 2716Reputation: 2716Reputation: 2716Reputation: 2716Reputation: 2716Reputation: 2716Reputation: 2716Reputation: 2716Reputation: 2716Reputation: 2716
Quote:
Originally Posted by boughtonp View Post
Profitability doesn't require competence, and there are only three BIOS vendors involved.

Not that I'd rule out a deliberate backdoor, but it really doesn't surprise me.

In addition to simply being the work of an average incompetent developer, I can easily imagine "display an image" being a task given to an intern who has yet to learn anything meaningful about security, and it could also be "here's a quick and dirty version to start with, we'll replace it before launch" that, once an arbitrary deadline approaches, a non-developer project manager declares as good enough.

Which argues for the use of the FOSS bio alternatives. (See articles on coreboot, libreboot, osboot, heads for examples.)
 
Old 12-22-2023, 10:25 PM   #11
SunnyJim
Member
 
Registered: Jan 2016
Location: Canada
Distribution: slackware and linux mint
Posts: 110

Rep: Reputation: Disabled
Do you seriously think these guys are going to want to give up their free lunch
And if they did or we were able to wrest control of our hardware platforms from their lazy fingers
how long could we retain it anyway. Here is hoping (and i mean it) it will happen soon. Or maybe perhaps patch the vulnerable
logo boot image with a vetted and safe one (or maybe a picture of your cat i don't know) this might help. I for one
don't even display a corporate logo and that's good enough for me. Perhaps a slackware logo would be nice then at least we might
be sure it's safe by doing some sort of security check on it at boot up as well.
 
Old 12-23-2023, 12:58 PM   #12
wpeckham
LQ Guru
 
Registered: Apr 2010
Location: Continental USA
Distribution: Debian, Ubuntu, RedHat, DSL, Puppy, CentOS, Knoppix, Mint-DE, Sparky, VSIDO, tinycore, Q4OS, Manjaro
Posts: 5,695

Rep: Reputation: 2716Reputation: 2716Reputation: 2716Reputation: 2716Reputation: 2716Reputation: 2716Reputation: 2716Reputation: 2716Reputation: 2716Reputation: 2716Reputation: 2716
Quote:
Originally Posted by SunnyJim View Post
Do you seriously think these guys are going to want to give up their free lunch
And if they did or we were able to wrest control of our hardware platforms from their lazy fingers
how long could we retain it anyway. Here is hoping (and i mean it) it will happen soon. Or maybe perhaps patch the vulnerable
logo boot image with a vetted and safe one (or maybe a picture of your cat i don't know) this might help. I for one
don't even display a corporate logo and that's good enough for me. Perhaps a slackware logo would be nice then at least we might
be sure it's safe by doing some sort of security check on it at boot up as well.
NOT the worst reason to use Open Source hardware and CPU with FOSS Firmware booting!
 
Old 12-23-2023, 05:42 PM   #13
SunnyJim
Member
 
Registered: Jan 2016
Location: Canada
Distribution: slackware and linux mint
Posts: 110

Rep: Reputation: Disabled
As i said: "Perhaps a slackware logo would be nice then at least we might
be sure it's safe by doing some sort of security check on it at boot up as well."
So the question remains how do we do it? Or is this a question for the opensource firmware people.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
[SOLVED] Simultaneous setup for booting with LILO for BIOSes and ELILO for UEFIs - for a system hosted in an external USB hard drive? ZhaoLin1457 Slackware 4 02-16-2020 12:46 PM
LXer: Android devices can be fatally hacked by malicious Wi-Fi networks LXer Syndicated Linux News 0 04-09-2017 04:57 AM
[SOLVED] USB devices are "Unknown Devices" under Windows 7 Home x64 KVM KARNVORbeefRAGE Linux - Virtualization and Cloud 5 10-08-2016 06:02 PM
How will linux bypass the secure boot feature in devices windows 8 devices ??? ylang Linux - General 12 09-20-2012 10:24 AM
[SOLVED] My network is hacked for sure. I want to reinstall but it will be hacked again. MsRefusenik Linux - Security 19 10-18-2010 05:02 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Hardware

All times are GMT -5. The time now is 08:07 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration