Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Define requirements in terms of kernel lockdown patches #231

Open
julian-klode opened this issue Mar 8, 2022 · 2 comments
Open

Define requirements in terms of kernel lockdown patches #231

julian-klode opened this issue Mar 8, 2022 · 2 comments
Labels
meta Not a review request, but an issue or notice wrt the signing process

Comments

@julian-klode
Copy link
Collaborator

julian-klode commented Mar 8, 2022

@mjg59 recently pointed out a kernel that should have lockdown support, but still allowed random port io with ioperm(), which leads to the bigger question:

There have been various iterations of the kernel lockdown patchset that distributions have applied in releases, and it's not entirely clear what the baseline should be, and when it should move forward, as a requirement for shim signing.

@julian-klode julian-klode added the meta Not a review request, but an issue or notice wrt the signing process label Mar 8, 2022
@julian-klode
Copy link
Collaborator Author

We need to

  1. define a baseline, probably the merged initial patch set + maybe some followup patches
    1.1. do additional lockdown patches get CVEs or are they not considered security bugs, but hardening features?)
  2. define how we want to handle adding new lockdown patches to the requirements (figure out what MS wants)

@ecos-platypus
Copy link
Contributor

ecos-platypus commented Jul 20, 2022

The upstream commit for fixing CVE-2022-21505 (see https://seclists.org/oss-sec/2022/q3/57) should be included in the list once the patch has made it into upstream. IMA should prevent setting ima_appraise=log when booted via secure boot but you could argue that it is more secure to assume that IMA may fail to prevent setting ima_appraise=log and therefore also prevent this issue when booted via secure boot.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
meta Not a review request, but an issue or notice wrt the signing process
Projects
None yet
Development

No branches or pull requests

2 participants