[PATCH v7 02/10] spl: make CMD_BOOTZ exclusive with TI_SECURE_DEVICE
Tom Rini
trini at konsulko.com
Fri Jun 6 21:00:42 CEST 2025
On Tue, Jun 03, 2025 at 07:54:42PM +0530, Anshul Dalal wrote:
> In the secure OS_BOOT spl execution code path, CMD_BOOTZ enables loading
> of a zImage which might allow an attacker to bypass the authenticated
> boot with fitImage by replacing it with a malicious image with header
> identical to zImage.
>
> Disabling CMD_BOOTZ ensures this code path is never hit inside
> spl_parse_image_header.
>
> Signed-off-by: Anshul Dalal <anshuld at ti.com>
Reviewed-by: Tom Rini <trini at konsulko.com>
--
Tom
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 659 bytes
Desc: not available
URL: <https://lists.denx.de/pipermail/u-boot/attachments/20250606/5a46c7c8/attachment.sig>
More information about the U-Boot
mailing list