Gentoo Archives: gentoo-user

From: Grant Edwards <grant.b.edwards@×××××.com>
To: gentoo-user@l.g.o
Subject: [gentoo-user] Re: New Intel vulnerability?
Date: Sat, 07 Mar 2020 17:21:14
Message-Id: r40l5s$316s$1@ciao.gmane.io
In Reply to: Re: [gentoo-user] New Intel vulnerability? by Rich Freeman
1 On 2020-03-07, Rich Freeman <rich0@g.o> wrote:
2
3 > In this case we're talking about a TPM where a threat model
4 > is an attacker with physical access that is trying to play games with
5 > the busses/etc, and as such it is important that it initialize using
6 > code in ROM that is known-good.
7
8 Note that the person behind the attack doesn't need physical
9 access. If an attacker can shove malicious firmware into something
10 like a PCI card with DMA bus-master capabilities, then on power-up
11 that card can carry out the attack. However, getting the firmware
12 into the PCI card would probably require root privledges, so there
13 would need to be a pre-existing privledge-elevation vulnerability.
14
15 I think. :)
16
17 --
18 Grant

Replies

Subject Author
Re: [gentoo-user] Re: New Intel vulnerability? Rich Freeman <rich0@g.o>