• dosse91@lemmy.trippy.pizza
    link
    fedilink
    English
    arrow-up
    47
    arrow-down
    4
    ·
    edit-2
    2 months ago

    It means it’s what we in the trade call “a nothingburger”. On Windows you need to explicitly install a malicious driver (which in turn requires to you to disable signature verification), on Linux you’d have to load a malicious kernel module (which requires pasting commands as root, and it would probably be proprietary since it has malware to hide and as every nvidia user knows, proprietary kernel modules break with kernel updates)

    • conciselyverbose@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      22
      arrow-down
      1
      ·
      2 months ago

      So install a multiplayer game, it has kernel level anticheat that opens a bunch of security holes, game over.

      Kernel level access is absolutely achievable in the real world.

    • mox@lemmy.sdf.org
      link
      fedilink
      English
      arrow-up
      7
      arrow-down
      4
      ·
      edit-2
      2 months ago

      No, it does not mean you would need to do that.

      The more likely scenario is an attacker using another vulnerability, either in the OS itself or in a vendor-supplied component like a driver or anti-cheat module, to gain a foothold for this one. Chaining exploits is a very common technique. (What “trade” are you in, exactly?)

      Apply the mitigations when they become available for your hardware, folks.

    • SupraMario@lemmy.world
      link
      fedilink
      English
      arrow-up
      3
      arrow-down
      1
      ·
      2 months ago

      This article should say, with this one easy hack you can control an AMD users PC, all you gotta do is break into their home at 10pm right before they log off from browsing reddit and bam access.