Back to bug 2177862
| Who | When | What | Removed | Added |
|---|---|---|---|---|
| Pedro Sampaio | 2023-03-13 17:50:38 UTC | Blocks | 2177863 | |
| Rohit Keshri | 2023-03-13 19:33:27 UTC | Fixed In Version | Kernel 5.19 RC1 | |
| Rohit Keshri | 2023-03-13 19:42:52 UTC | Depends On | 2177896, 2177894, 2177895, 2177893 | |
| Rohit Keshri | 2023-03-13 19:46:31 UTC | Doc Text | Dm-verity is used for extending root-of-trust to root filesystems. LoadPin builds on this property to restrict module/firmware loads to just the trusted root filesystem. Device-mapper table reloads currently allow users with root privileges to switch out the target with an equivalent dm-linear target and bypass verification till reboot. This allows root to bypass LoadPin and can be used to load untrusted and unverified kernel modules and firmware, which implies arbitrary kernel execution and persistence for peripherals that do not verify firmware updates. | |
| Rohit Keshri | 2023-03-13 19:48:38 UTC | Depends On | 2177899, 2177900 | |
| Paige Jung | 2023-03-13 20:49:21 UTC | Doc Text | Dm-verity is used for extending root-of-trust to root filesystems. LoadPin builds on this property to restrict module/firmware loads to just the trusted root filesystem. Device-mapper table reloads currently allow users with root privileges to switch out the target with an equivalent dm-linear target and bypass verification till reboot. This allows root to bypass LoadPin and can be used to load untrusted and unverified kernel modules and firmware, which implies arbitrary kernel execution and persistence for peripherals that do not verify firmware updates. | A flaw was found in the Linux kernel. Dm-verity is used for extending root-of-trust to root filesystems. LoadPin builds on this property to restrict module and firmware loads to just the trusted root filesystem. Device-mapper table reloads currently allow users with root privileges to switch out the target with an equivalent dm-linear target and bypass verification until reboot. This allows root to bypass LoadPin and can be used to load untrusted and unverified kernel modules and firmware, which implies arbitrary kernel execution and persistence for peripherals that do not verify firmware updates. |
| Alasdair Kergon | 2023-03-13 21:23:42 UTC | CC | agk | |
| Pedro Sampaio | 2023-03-30 12:35:23 UTC | Depends On | 2183117, 2183114, 2183116, 2183115 | |
| Red Hat Bugzilla | 2023-04-01 08:41:36 UTC | CC | dhoward | |
| Gonzalo Siero | 2023-06-30 08:34:00 UTC | Depends On | 2012340 | |
| Red Hat Bugzilla | 2023-07-07 08:32:56 UTC | Assignee | security-response-team | nobody |
Back to bug 2177862