[Semibug] Will OpenBSD's Pledge and Unveil stop this?
Josh Grosse
josh at jggimi.net
Thu Mar 2 12:07:07 EST 2023
On Thu, Mar 02, 2023 at 09:43:36AM -0700, Jonathan Drews wrote:
> Guys and gals:
>
> I read this:
> It's official: BlackLotus malware can bypass Secure Boot on Windows machines
> https://www.theregister.com/2023/03/01/blacklotus_malware_eset/
>
> Will Pledge and Unveil prevent tsomething like this from invading my OpenBSD laptop?
I don't think so, it's a different attack vector. Please also note that
this is an attack against Secure Boot, which isn't used by OpenBSD.
The pledge(2) and unveil(2) syscalls are designed for use by the
application developer to intentionally restrict her application
to a subset of syscalls or a subset of filesystems. Useful primarily
for ensuring the application behaves as the developer intended.
With pledge() the application aborts if an unauthorized syscall is
made, and with unveil() the application fails to open, read, or write
to unauthorized files or directories.
More information about the Semibug
mailing list