ACK: [SRU][OEM-5.14, OEM-5.17][PATCH 0/1] CVE-2022-21505
Tim Gardner
tim.gardner at canonical.com
Wed Mar 22 12:49:34 UTC 2023
On 3/21/23 1:38 PM, Magali Lemes wrote:
> [Impact]
> Kernel lockdown can be bypassed when UEFI secure boot is disabled or
> unavailable and IMA appraisal is enabled.
>
> [Backport]
> Clean cherry-pick.
>
> [Test]
> Compile tested.
>
> [Regression potential]
> Low, but IMA appraisal could be affected as another check is added to the
> ima_appraise_signature() function.
>
> Eric Snowberg (1):
> lockdown: Fix kexec lockdown bypass with ima policy
>
> security/integrity/ima/ima_policy.c | 4 ++++
> 1 file changed, 4 insertions(+)
>
Acked-by: Tim Gardner <tim.gardner at canonical.com>
--
-----------
Tim Gardner
Canonical, Inc
More information about the kernel-team
mailing list