Verify kexec image signatures on arm64
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
linux (Ubuntu) |
Invalid
|
Undecided
|
dann frazier | ||
Disco |
Invalid
|
Undecided
|
Unassigned | ||
Eoan |
Invalid
|
Undecided
|
Unassigned | ||
Focal |
Invalid
|
Undecided
|
dann frazier |
Bug Description
While reviewing our kernel configs in Focal, I noticed that we produce signed arm64 kernels since Disco but don't seem to be verifying any signatures during kexec. Specifically, CONFIG_
== Disco ==
$ git grep CONFIG_
debian.
debian.
== Eoan ==
$ git grep CONFIG_
debian.
debian.
debian.
Looking at the Ubuntu-5.3.0-19.20 tag in Eoan, it looks like the CONFIG_
$ cat -n arch/arm64/
116 #ifdef CONFIG_
117 static int image_verify_
118 {
119 return verify_
120 VERIFYING_
121 }
122 #endif
123
124 const struct kexec_file_ops kexec_image_ops = {
125 .probe = image_probe,
126 .load = image_load,
127 #ifdef CONFIG_
128 .verify_sig = image_verify_sig,
129 #endif
130 };
Changed in linux (Ubuntu): | |
assignee: | nobody → dann frazier (dannf) |
information type: | Private Security → Public Security |
Dann, can you please take a look at this and offer your opinion? Thanks!