From mboxrd@z Thu Jan 1 00:00:00 1970 From: Matthew Garrett Subject: Re: [RFC] Second attempt at kernel secure boot support Date: Wed, 31 Oct 2012 15:56:35 +0000 Message-ID: <20121031155635.GA14294@srcf.ucam.org> References: <1348152065-31353-1-git-send-email-mjg@redhat.com> <20121029174131.GC7580@srcf.ucam.org> <20121031155503.1aaf4c93@pyramind.ukuu.org.uk> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Return-path: Content-Disposition: inline In-Reply-To: <20121031155503.1aaf4c93@pyramind.ukuu.org.uk> Sender: linux-security-module-owner@vger.kernel.org To: Alan Cox Cc: Josh Boyer , Jiri Kosina , linux-kernel@vger.kernel.org, linux-security-module@vger.kernel.org, linux-efi@vger.kernel.org List-Id: linux-efi@vger.kernel.org 1) Gain root. 2) Modify swap partition directly. 3) Force reboot. 4) Win. Root should not have the ability to elevate themselves to running arbitrary kernel code. Therefore, the above attack needs to be impossible. -- Matthew Garrett | mjg59@srcf.ucam.org