|
Message-ID: <deba4116-70d2-0d08-4e80-ca8da698d5ec@linux.vnet.ibm.com> Date: Tue, 6 Jul 2021 19:16:00 -0400 From: Nayna <nayna@...ux.vnet.ibm.com> To: oss-security@...ts.openwall.com Cc: George Wilson <gcwilson@...ux.ibm.com>, Mimi Zohar <zohar@...ux.ibm.com>, naynjain@....com Subject: CVE-2021-35039: Linux kernel loading unsigned kernel modules via init_module syscall Vulnerability: Linux Kernel loading unsigned kernel modules via init_module syscall Fixes: 7c9bc0983f89 ("ima: check signature enforcement against cmdline param instead of CONFIG") Commit: 0c18f29aae7c ("module: limit enabling module.sig_enforce") CVE: CVE-2021-35039 Details: The IMA arch specific policy rules, when enabled on x86, arm or powerpc, kernels with IMA_APPRAISE_REQUIRE_MODULE_SIGS configured, or systems with custom IMA policies containing a similar module rule, require all kernel modules to be signed. IMA, currently, only verifies kernel module signatures loaded via finit_module and relies on CONFIG_MODULE_SIG to verify kernel modules signatures loaded via init_module. The patch addresses the situation where MODULE_SIG is not enabled, but "module.sig_enforce=1" is specified on the boot command line. Affected Kernel Versions: 4.15 through 5.12
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.