Andrey Konovalov wochokera ku Google
Lockdown imalepheretsa ogwiritsa ntchito kulowa mu kernel ndikuletsa njira za UEFI Secure Boot bypass. Mwachitsanzo, mumalowedwe otsekera, mwayi wopita ku / dev/mem, /dev/kmem, /dev/port, /proc/kcore, debugfs, kprobes debugging mode, mmiotrace, tracefs, BPF, PCMCIA CIS (Kapangidwe ka Chidziwitso Chamakhadi), zina ma interfaces ndi ochepa ACPI ndi MSR zolembera za CPU, kuyitana kwa kexec_file ndi kexec_load kutsekedwa, njira yogona ndiyoletsedwa, DMA kugwiritsa ntchito zipangizo za PCI ndizochepa, kuitanitsa kachidindo ka ACPI kuchokera ku mitundu ya EFI ndikoletsedwa, kugwiritsira ntchito madoko a I / O sikuletsedwa. zololedwa, kuphatikiza kusintha nambala yosokoneza ndi doko la I/O la doko la serial.
Makina a Lockdown adawonjezedwa ku Linux kernel yayikulu
Ku Ubuntu ndi Fedora, kuphatikiza kiyi Alt + SysRq + X kumaperekedwa kuti mulepheretse Lockdown. Zimamveka kuti kuphatikiza Alt + SysRq + X chitha kugwiritsidwa ntchito pokhapokha pa chipangizocho, ndipo ngati atabera patali ndikupeza mizu, wowukirayo sangathe kuletsa Lockdown ndipo, mwachitsanzo, kutsitsa a. module yokhala ndi rootkit yomwe siinasainidwe ndi digito mu kernel.
Andrey Konovalov adawonetsa kuti njira zozikidwa pa kiyibodi zotsimikizira kupezeka kwa wogwiritsa ntchito ndizosathandiza. Njira yosavuta yoletsera Lockdown ingakhale mwadongosolo
Njira yoyamba imaphatikizapo kugwiritsa ntchito mawonekedwe a "sysrq-trigger" - kuti muyesere, ingoyambitsani mawonekedwewa polemba "1" ku /proc/sys/kernel/sysrq, kenako lembani "x" ku /proc/sysrq-trigger. Anatero loophole
Njira yachiwiri ikukhudza kutsanzira kiyibodi kudzera
Source: opennet.ru