fwupd has dbx plugin enabled but shouldn't

Bug #1971965 reported by Steve Langasek
10
This bug affects 2 people
Affects Status Importance Assigned to Milestone
fwupd (Ubuntu)
Expired
Undecided
Unassigned
Focal
Expired
Undecided
Unassigned
Impish
Expired
Undecided
Unassigned
Jammy
Expired
Undecided
Unassigned
Kinetic
Expired
Undecided
Unassigned

Bug Description

In discussion with the Security Team, I've learned that the dbx plugin in fwupd is enabled by default. Prior to 22.04 release I had conversations about the fact that we should not be using fwupd to deliver dbx updates by default, but these don't seem to have resulted in changes to the packaging. We may in the future want to use fwupd to deliver dbx updates, but in the meantime there is a concern that delivery of dbx updates needs to be coordinated with the OS (we have the secureboot-db package seeded across all products in support of this), and there is not coordination between fwupd and the OS package manager.

We need to update fwupd to disable the dbx plugin by default (DisabledPlugins= in /etc/fwupd/daemon.conf).

This affects both jammy and focal, where fwupd has been SRUed.

ProblemType: Bug
DistroRelease: Ubuntu 22.04
Package: fwupd 1.7.5-3
ProcVersionSignature: Ubuntu 5.15.0-27.28-generic 5.15.30
Uname: Linux 5.15.0-27-generic x86_64
NonfreeKernelModules: zfs zunicode zavl icp zcommon znvpair
ApportVersion: 2.20.11-0ubuntu82
Architecture: amd64
CasperMD5CheckResult: unknown
CurrentDesktop: ubuntu:GNOME
Date: Fri May 6 11:04:01 2022
InstallationDate: Installed on 2019-12-23 (864 days ago)
InstallationMedia: Ubuntu 19.10 "Eoan Ermine" - Release amd64 (20191017)
RebootRequiredPkgs: Error: path contained symlinks.
SourcePackage: fwupd
UpgradeStatus: Upgraded to jammy on 2022-04-15 (20 days ago)

Revision history for this message
Steve Langasek (vorlon) wrote :
description: updated
tags: added: fr-2358
Revision history for this message
Mario Limonciello (superm1) wrote :

Before making a change to packaging can we discuss the "why"? Dbx updates coming this way are mutually exclusive with packaged updates. They would just enable users to "opt in" to them even if they turned off security updates from packages.

I also want to remind you that dbx updates can come from BIOS too which users can opt into installation already as well.

Revision history for this message
Mario Limonciello (superm1) wrote :

Oh - one more point to share regarding coordination. The fwupd dbx plugins DOES validate the content on the ESP. If the revocation update contains a signature on the ESP, the update will not be allowed to be installed by default.

The code that does runs as part of the 'prepare' state of the dbx update installation. So the dbx would not be installed in this case:
https://github.com/fwupd/fwupd/blob/main/plugins/uefi-dbx/fu-uefi-dbx-device.c#L85

Changed in fwupd (Ubuntu Kinetic):
status: New → Incomplete
Changed in fwupd (Ubuntu Jammy):
status: New → Incomplete
Changed in fwupd (Ubuntu Impish):
status: New → Incomplete
Changed in fwupd (Ubuntu Focal):
status: New → Incomplete
Revision history for this message
Launchpad Janitor (janitor) wrote :

[Expired for fwupd (Ubuntu Kinetic) because there has been no activity for 60 days.]

Changed in fwupd (Ubuntu Kinetic):
status: Incomplete → Expired
Revision history for this message
Launchpad Janitor (janitor) wrote :

[Expired for fwupd (Ubuntu Focal) because there has been no activity for 60 days.]

Changed in fwupd (Ubuntu Focal):
status: Incomplete → Expired
Revision history for this message
Launchpad Janitor (janitor) wrote :

[Expired for fwupd (Ubuntu Jammy) because there has been no activity for 60 days.]

Changed in fwupd (Ubuntu Jammy):
status: Incomplete → Expired
Revision history for this message
Launchpad Janitor (janitor) wrote :

[Expired for fwupd (Ubuntu Impish) because there has been no activity for 60 days.]

Changed in fwupd (Ubuntu Impish):
status: Incomplete → Expired
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.