Back to bug 2177862

Who When What Removed Added
Pedro Sampaio 2023-03-13 17:50:38 UTC Blocks 2177863
Rohit Keshri 2023-03-13 19:33:27 UTC Fixed In Version Kernel 5.19 RC1
Rohit Keshri 2023-03-13 19:42:52 UTC Depends On 2177896, 2177894, 2177895, 2177893
Rohit Keshri 2023-03-13 19:46:31 UTC Doc Text Dm-verity is used for extending root-of-trust to root filesystems. LoadPin builds on this property to restrict module/firmware loads to just the trusted root filesystem. Device-mapper table reloads currently allow users with root privileges to switch out the target with an equivalent dm-linear target and bypass verification till reboot. This allows root to bypass LoadPin and can be used to load untrusted and unverified kernel modules and firmware, which implies arbitrary kernel execution and persistence for peripherals that do not verify firmware updates.
Rohit Keshri 2023-03-13 19:48:38 UTC Depends On 2177899, 2177900
Paige Jung 2023-03-13 20:49:21 UTC Doc Text Dm-verity is used for extending root-of-trust to root filesystems. LoadPin builds on this property to restrict module/firmware loads to just the trusted root filesystem. Device-mapper table reloads currently allow users with root privileges to switch out the target with an equivalent dm-linear target and bypass verification till reboot. This allows root to bypass LoadPin and can be used to load untrusted and unverified kernel modules and firmware, which implies arbitrary kernel execution and persistence for peripherals that do not verify firmware updates. A flaw was found in the Linux kernel. Dm-verity is used for extending root-of-trust to root filesystems. LoadPin builds on this property to restrict module and firmware loads to just the trusted root filesystem. Device-mapper table reloads currently allow users with root privileges to switch out the target with an equivalent dm-linear target and bypass verification until reboot. This allows root to bypass LoadPin and can be used to load untrusted and unverified kernel modules and firmware, which implies arbitrary kernel execution and persistence for peripherals that do not verify firmware updates.
Alasdair Kergon 2023-03-13 21:23:42 UTC CC agk
Pedro Sampaio 2023-03-30 12:35:23 UTC Depends On 2183117, 2183114, 2183116, 2183115
Red Hat Bugzilla 2023-04-01 08:41:36 UTC CC dhoward
Gonzalo Siero 2023-06-30 08:34:00 UTC Depends On 2012340
Red Hat Bugzilla 2023-07-07 08:32:56 UTC Assignee security-response-team nobody

Back to bug 2177862