Hi Steve Langasek,
If an attacker is able to sign a custom kernel module & compromise a system via 
that means is there a reason to restrict the rather easy to use 
`update-secureboot-policy --new-key` method to only kernel modules? (Can we 
modify it to allow signing kernels in addition to kernel modules?)

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1939565

Title:
  kernel signed by mok failed to boot if secure boot is on

To manage notifications about this bug go to:
https://bugs.launchpad.net/oem-priority/+bug/1939565/+subscriptions


-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to