[Bug 1890835] Update Released
Łukasz Zemczak
1890835 at bugs.launchpad.net
Tue Sep 22 12:46:22 UTC 2020
The verification of the Stable Release Update for secureboot-db has
completed successfully and the package is now being released to
-updates. Subsequently, the Ubuntu Stable Release Updates Team is being
unsubscribed and will not receive messages about this bug report. In
the event that you encounter a regression using the package from
-updates please report a new bug using ubuntu-bug and tag the bug report
regression-update so we can easily find any regressions.
--
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to secureboot-db in Ubuntu.
https://bugs.launchpad.net/bugs/1890835
Title:
secureboot-db 2020 update
Status in secureboot-db package in Ubuntu:
Fix Released
Status in secureboot-db source package in Trusty:
New
Status in secureboot-db source package in Xenial:
Fix Committed
Status in secureboot-db source package in Bionic:
Fix Committed
Status in secureboot-db source package in Focal:
Fix Released
Status in secureboot-db source package in Groovy:
Fix Released
Bug description:
NB! do not release this update to -updates, until slow phasing is
available, at 4% per day.
NB! ideally phase one series at the time, to ensure we can deal with a
flood of support requests if any arise.
[Impact]
* Ship 2020 dbxupdate from MS
[Test Case]
* In case of multi-boot systems, please plan to boot into every
operating system on your multi-boot systems and install updates as
soon as your other operating system distributions publish updates for
BootHole vulnerability.
* Install package on Secureboot UEFI enabled system
* Reboot
* Observe that it still reboots
[Regression Potential]
* Installing this package even once will update DBX variable in the
UEFI firmware and will prevent booting:
- All Ubuntu, Debian, RHEL, Fedora, OpenSUSE, SUSE, Oracle Linux milestones / media released before August 2020
- Certain version of Kaspersky Labs UEFI protect software
- Certain version of HPE Inc ProLiant automatic OS provisioning
As they are all vulnerable to the BootHole vunlerability.
For example, one will have to use 16.04.7 LTS, 18.04.5 LTS, 20.04.1
LTS installer media if they want to reinstall.
If any dual boot configurations are failing to boot, one must
navigated to UEFI BIOS settings and either reset DBX variables to
stock values, or disable secureboot. Upgrade any systems that are now
prohibited to boot. And then re-enable secureboot & reinstall
secureboot-db package to reapply dbx updates.
Please note simple downgrade of secureboot-db package will not achieve
anything, as downgrading the package does not revert the firmware
changes.
[Other Info]
* For more inforamtion please see
https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/GRUB2SecureBootBypass
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/secureboot-db/+bug/1890835/+subscriptions
More information about the foundations-bugs
mailing list