Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Date: Tue, 19 Feb 2019 23:23:06 +0000
From: Paweł Krawczyk <pawel.krawczyk@...h.com>
To: lkrg-users@...ts.openwall.com
Subject: Canonical Livepatch

An improvement idea: somehow whitelist Canonical Livepatch service
which, well, modifies the live kernel at random times :)

Feb  4 15:57:53 otto kernel: [2343034.001490] PKCS#7 signature not
signed with a trusted key
Feb  4 15:57:53 otto kernel: [2343034.001592]
lkp_Ubuntu_4_15_0_43_46_generic_47: tainting kernel with TAINT_LIVEPATCH
Feb  4 15:57:53 otto kernel: [2343034.051073] livepatch: enabling patch
'lkp_Ubuntu_4_15_0_43_46_generic_47'
Feb  4 15:57:53 otto kernel: [2343034.067371] livepatch:
'lkp_Ubuntu_4_15_0_43_46_generic_47': starting patching transition
Feb  4 15:57:56 otto kernel: [2343036.445768] livepatch:
'lkp_Ubuntu_4_15_0_43_46_generic_47': patching complete
Feb  4 15:57:57 otto kernel: [2343037.421239] [p_lkrg] ALERT !!! _STEXT
MEMORY BLOCK HASH IS DIFFERENT - it is [0x1333dcff16d6863] and should be
[0x61bd75c26954c184] !!!
Feb  4 15:57:57 otto kernel: [2343037.432506] [p_lkrg] ALERT !!! SYSTEM
HAS BEEN COMPROMISED - DETECTED DIFFERENT 1 CHECKSUMS !!!

-- 
Paweł Krawczyk
+44 7879 180015




Download attachment "signature.asc" of type "application/pgp-signature" (900 bytes)

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.