[Bug 1776996] Re: secureboot-db out of date, missing revocations from Aug 2016

Ɓukasz Zemczak 1776996 at bugs.launchpad.net
Tue Oct 23 15:22:18 UTC 2018


Hello Steve, or anyone else affected,

Accepted secureboot-db into bionic-proposed. The package will build now
and be available at https://launchpad.net/ubuntu/+source/secureboot-
db/1.4~ubuntu0.18.04.1 in a few hours, and then in the -proposed
repository.

Please help us by testing this new package.  See
https://wiki.ubuntu.com/Testing/EnableProposed for documentation on how
to enable and use -proposed.  Your feedback will aid us getting this
update out to other Ubuntu users.

If this package fixes the bug for you, please add a comment to this bug,
mentioning the version of the package you tested and change the tag from
verification-needed-bionic to verification-done-bionic. If it does not
fix the bug for you, please add a comment stating that, and change the
tag to verification-failed-bionic. In either case, without details of
your testing we will not be able to proceed.

Further information regarding the verification process can be found at
https://wiki.ubuntu.com/QATeam/PerformingSRUVerification .  Thank you in
advance for helping!

N.B. The updated package will be released to -updates after the bug(s)
fixed by this package have been verified and the package has been in
-proposed for a minimum of 7 days.

** Changed in: secureboot-db (Ubuntu Bionic)
       Status: Triaged => Fix Committed

** Tags added: verification-needed verification-needed-bionic

-- 
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to secureboot-db in Ubuntu.
https://bugs.launchpad.net/bugs/1776996

Title:
  secureboot-db out of date, missing revocations from Aug 2016

Status in secureboot-db package in Ubuntu:
  Fix Released
Status in secureboot-db source package in Trusty:
  Triaged
Status in secureboot-db source package in Xenial:
  Fix Committed
Status in secureboot-db source package in Bionic:
  Fix Committed

Bug description:
  Impact
  ------
  A signed variable update for secureboot dbx has been published by Microsoft to uefi.org; last updated 2016-08-11: http://www.uefi.org/sites/default/files/resources/dbxupdate.zip

  This file has not been included in the secureboot-db package in
  Ubuntu; so users who only boot Ubuntu and not Windows will not have
  these revocations applied, meaning their firmware will trust (and
  possibly be exploitable by) whatever binaries these revoked hashes
  correspond to.

  Additionally, the attributes of the EFI variables need to be modified
  before trying to call sbkeysync so that the database update can be
  applied.

  Test Case
  ---------
  On a UEFI system with secureboot disabled do the following
  1) Check the output of 'mokutil --dbx'
  2) Update secureboot-db to the version from -proposed
  3) Check the output of 'mokutil --dbx' and verify its different from the first run

  Additionally it should be verified that the new package installs on a
  secureboot-enabled system, in a container, on a BIOS-booted system.

  Regression Potential
  --------------------
  Its possible the revoked hashes are incorrect so they should be double checked to ensure they match the Microsoft update.

  Original Description
  --------------------
  Separately, I seem in testing to be unable to apply this signed database update to my system using sbkeysync, despite having the Microsoft CA in my KEK.  So it's possible that sbkeysync doesn't work; we may need to either fix it, or switch to other code that does work, such as the dbxtool in Fedora.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/secureboot-db/+bug/1776996/+subscriptions



More information about the foundations-bugs mailing list