[Secure-testing-team] Bug#820008: Support for securelevel and Secure Boot

Ben Hutchings ben at decadent.org.uk
Mon Apr 4 18:51:25 UTC 2016


Package: src:linux
Version: 4.5-1~exp1
Severity: important
Tags: security

To ensure the integrity of the kernel, we should support a securelevel
where all modules must be signed by a trusted key and all APIs
allowing arbitrary memory writes are disabled.

To meet Secure Boot requirements, we need to turn this on whenever
booted with SB enabled.

Ben.

-- System Information:
Debian Release: stretch/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (500, 'stable'), (1, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 4.4.0-1-amd64 (SMP w/4 CPU cores)
Locale: LANG=C.UTF-8, LC_CTYPE=C.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)



More information about the Secure-testing-team mailing list