Update lockdown patches
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
linux (Ubuntu) |
Fix Released
|
Critical
|
Seth Forshee | ||
Xenial |
Fix Released
|
Critical
|
Seth Forshee | ||
Bionic |
Fix Released
|
Critical
|
Seth Forshee | ||
Eoan |
Fix Released
|
Critical
|
Seth Forshee | ||
Focal |
Fix Released
|
Critical
|
Seth Forshee | ||
linux-oem-osp1 (Ubuntu) |
Fix Released
|
Undecided
|
Unassigned | ||
Bionic |
Fix Released
|
Undecided
|
Unassigned |
Bug Description
Impact: The lockdown patches have evolved over time, and part of this was restricting more areas of the kernel. Not all of these additions were backported, and some can lead to lockdown bypasses, see [1] and [2].
Fix: Backport newer lockdown restrictions to older releases.
Test Case: Test cases for most of the backports can be found at [3], and [4] is another test case. Some which need e.g. specific hardware to test have not been tested.
Regression Potential: Most of these are small, simple fixes with low potential for regression. Users may also lose access to some functionality previously accissible under secure boot. Some changes are more substantial, especially the hw_param and debugfs changes for xenial, but they are based on well-tested upstream code. The xmon backports also carry a more moderate risk of regression.
[1] https:/
[2] https://<email address hidden>/
[3] https:/
[4] https:/
CVE References
Changed in linux (Ubuntu): | |
status: | In Progress → Fix Committed |
Changed in linux (Ubuntu Xenial): | |
assignee: | nobody → Seth Forshee (sforshee) |
importance: | Undecided → Critical |
status: | New → In Progress |
Changed in linux (Ubuntu Bionic): | |
assignee: | nobody → Seth Forshee (sforshee) |
importance: | Undecided → Critical |
status: | New → In Progress |
Changed in linux (Ubuntu Eoan): | |
assignee: | nobody → Seth Forshee (sforshee) |
importance: | Undecided → Critical |
status: | New → In Progress |
Changed in linux (Ubuntu Focal): | |
assignee: | nobody → Seth Forshee (sforshee) |
importance: | Undecided → Critical |
status: | New → In Progress |
description: | updated |
Changed in linux (Ubuntu Eoan): | |
status: | In Progress → Fix Committed |
Changed in linux (Ubuntu Focal): | |
status: | In Progress → Fix Committed |
Changed in linux (Ubuntu Bionic): | |
status: | In Progress → Fix Committed |
Changed in linux (Ubuntu Xenial): | |
status: | In Progress → Fix Committed |
no longer affects: | linux-oem-osp1 (Ubuntu Xenial) |
no longer affects: | linux-oem-osp1 (Ubuntu Eoan) |
no longer affects: | linux-oem-osp1 (Ubuntu Focal) |
Changed in linux-oem-osp1 (Ubuntu): | |
status: | New → Invalid |
Changed in linux-oem-osp1 (Ubuntu Bionic): | |
status: | New → Fix Committed |
This bug is awaiting verification that the kernel in -proposed solves the problem. Please test the kernel and update this bug with the results. If the problem is solved, change the tag 'verification- needed- eoan' to 'verification- done-eoan' . If the problem still exists, change the tag 'verification- needed- eoan' to 'verification- failed- eoan'.
If verification is not done by 5 working days from today, this fix will be dropped from the source code, and this bug will be closed.
See https:/ /wiki.ubuntu. com/Testing/ EnableProposed for documentation how to enable and use -proposed. Thank you!