[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: <166259290380.77851.712633939405429705.b4-ty@chromium.org>
Date: Wed, 7 Sep 2022 16:21:45 -0700
From: Kees Cook <keescook@...omium.org>
To: mka@...omium.org, jmorris@...ei.org, serge@...lyn.com
Cc: Kees Cook <keescook@...omium.org>, dianders@...omium.org,
paul@...l-moore.com, sarthakkukreti@...omium.org,
linux-kernel@...r.kernel.org, linux-security-module@...r.kernel.org
Subject: Re: [PATCH] LoadPin: Require file with verity root digests to have a header
On Tue, 6 Sep 2022 18:18:12 -0700, Matthias Kaehlcke wrote:
> LoadPin expects the file with trusted verity root digests to be
> an ASCII file with one digest (hex value) per line. A pinned
> root could contain files that meet these format requirements,
> even though the hex values don't represent trusted root
> digests.
>
> Add a new requirement to the file format which consists in
> the first line containing a fixed string. This prevents
> attackers from feeding files with an otherwise valid format
> to LoadPin.
>
> [...]
Applied to for-next/hardening, thanks!
[1/1] LoadPin: Require file with verity root digests to have a header
https://git.kernel.org/kees/c/d64f3001976e
--
Kees Cook
Powered by blists - more mailing lists