#shim

Reshmi Aravindreshmi@mstdn.social
2025-10-08

We’re hiring on the Red Hat Bootloader team! Work on GRUB2, shim, the Linux kernel, and core bootloader toolchains — the foundation of every Red Hat system.

Location: Brno, Czech Republic 🇨🇿
Apply here : redhat.wd5.myworkdayjobs.com/J

#RedHat #Bootloader #GRUB2 #Shim #LinuxKernel #OpenSource #Hiring #Fedora

Kevin Karhan :verified:kkarhan@infosec.space
2025-06-29

@fuchsiii @ariadne +9001%

I think that #Wayback as a #Xwayland-#shim will allow using #Xorg-only Software on #Wayland-only Hardware without too much headaches.

  • IMHO "Xlibre" is just a shitshow…
Nicolas Fränkel 🇪🇺🇺🇦🇬🇪frankel@mastodon.top
2025-02-09
2024-12-29

Liveslak 1.8.2 re-adds Secure Boot support

When Slackware-current upgraded the Grub package to 2.12,  liveslak lost the ability to boot on a computer with Secure Boot enabled.

Grub 2.12 is a lot stricter than the previous 2.06 release when it comes to trusting the files it loads and executes. The way it works now is as follows (step 1 and 2 a

alien.slackbook.org/blog/lives

#Slackware #Software #certificate #gpg #grub #liveslak #secureboot #shim

2024-10-21
#Linux #LMDE #Mint / #Problema

Llevo ya casi 2 semanas con un verdadero dolor de muelas... y es que el puto paquete #shim-signed no se deja actualizar, ni remover.

Desactive #UEFI y borre la particion que contenia los archivos para el arranque (ya que esta tarea la deje subordinada a otra distro) y ahora no puedo quitar este pequete, porque seria indispensable para el sistema bajo ¿UEFI?

¿Como se puede remover algo que te dice "E: Removing essential system-critical packages is not permitted. This might break the system."?
🄻 🅂 🄳0j0
2024-10-15

I have the following in
When I installed it on the P50, I did not find the option to change the mode from to , so I installed Ubuntu with UEFI mode enabled.
Is it possible to disable UEFI mode and remove the -signed package (and its dependencies) inside Ubuntu?

Imagen: Modo UEFI en Lenovo
Thorsten Leemhuis (acct. 1/4)kernellogger@fosstodon.org
2024-03-14

Interesting detail in the description of the main EFI changes merged for #Linux 6.9[1]:

"'"Avoid creating mappings that are both writable and executable while running in the EFI boot services. This is a prerequisite for getting the x86 #shim loader signed by MicroSoft again, which allows the distros to install on x86 PCs that ship with EFI secure boot enabled."'"

[1] git.kernel.org/torvalds/c/70ef

#Kernel #LinuxKernel #SecureBoot

2024-02-10

@mcfly
No, the #SHIM vulnerability is NOT a "Remore Code Execution vulnerability" [sic]. Unless of course one would be so silly as to remote boot over the public internet.
It is a mere inside threat. Exploitation would need a quite sophisticated "evil maid". So in the end it is 'nothing to write home about'.

Richi Jenningsrichi@vmst.io
2024-02-08

A Microsoft researcher found it—and it’s somehow Microsoft’s fault.

A critical vulnerability in most #Linux distributions now has a patch ready. Enterprise users especially need this if booting using HTTP or PXE.

So go get it. In #SBBlogwatch, we patch #shim and update the DBX. At @TechstrongGroup’s @SecurityBlvd: securityboulevard.com/2024/02/

2024-02-08

An interesting vulnerability in the #shim package affects nearly all Linux distributions since the past decade.

thehackernews.com/2024/02/crit

Thorsten Leemhuis (acct. 4/4)thleemhuisfoss@social.tchncs.de
2024-02-08

"Shim macht auf Linux-Systemen Secure Boot nutzbar."[1] ist irgendwie wie "Nasse Straßen führen zu Regen", wie es Michael Crichton beim "Gell-Mann Amnesia Effect"[2] erwähnt. 🤔

Klar, irgendwie stimmt der Satz. Aber irgendwie auch nicht, denn ohne etwas wie #Shim ließen sich #Linux-Distributionen auf modernen #UEFI-Systemen out-of-the-box gar nicht erst nutzen, solange #SecureBoot aktiv ist. 🤨

[1] golem.de/news/shim-kritische-s

[2] en.wikipedia.org/wiki/Michael_

Hamish M (VK3FSB)hmoffatt@mastodon.au
2024-02-07

So the shim boot loader has a serious bug in its HTTP handling, but TIL that shim does HTTP (or in fact any networking at all) and I still have no idea why. #shim #infosec

2024-02-07
Denis Laskov 🇮🇱it4sec
2024-02-07

Hi, my name is Shim Shady! (NVD CVSS 9.8 - Critical)

Critical vulnerability
CVE-2023-40547 was identified in the software (used by most Linux distributions during the boot process). Particularly - to support Secure Boot.

eclypsium.com/blog/the-real-sh

Pete Prodoehl 🍕rasterweb
2023-12-20

It's been nearly 8 years since I 3D printed a shim...

➡️ rasterweb.net/raster/2015/12/2

@3dprinting@techhub.social

Reshmi Aravindreshmi@mstdn.social
2023-08-02

Red Hat is #hiring!
The Bootloader Engineering Team(Core Platforms Engineering) in Red Hat is looking for the sheer talented and open to all with the suitable skills passion and dedication.

#Hiring #RedHat #Fedora #bootloader #shim #Grub #firmware #uefi #OpenSource

🌎 Remote / Mexico
⏰ Full-time
🏢 Red Hat

Link to apply for this position on this diverse team:
global-redhat.icims.com/jobs/1

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst