Activity log for bug #1890835

Date Who What changed Old value New value Message
2020-08-07 16:54:48 Dimitri John Ledkov bug added bug
2020-08-16 14:21:10 Dimitri John Ledkov nominated for series Ubuntu Trusty
2020-08-16 14:21:10 Dimitri John Ledkov bug task added secureboot-db (Ubuntu Trusty)
2020-08-16 14:21:10 Dimitri John Ledkov nominated for series Ubuntu Groovy
2020-08-16 14:21:10 Dimitri John Ledkov bug task added secureboot-db (Ubuntu Groovy)
2020-08-16 14:21:10 Dimitri John Ledkov nominated for series Ubuntu Bionic
2020-08-16 14:21:10 Dimitri John Ledkov bug task added secureboot-db (Ubuntu Bionic)
2020-08-16 14:21:10 Dimitri John Ledkov nominated for series Ubuntu Xenial
2020-08-16 14:21:10 Dimitri John Ledkov bug task added secureboot-db (Ubuntu Xenial)
2020-08-16 14:21:10 Dimitri John Ledkov nominated for series Ubuntu Focal
2020-08-16 14:21:10 Dimitri John Ledkov bug task added secureboot-db (Ubuntu Focal)
2020-08-16 14:22:39 Dimitri John Ledkov tags block-proposed-bionic block-proposed-focal block-proposed-xenial
2020-08-20 10:22:08 Dimitri John Ledkov description secureboot-db 2020 update secureboot-db 2020 update Expecting long period in -proposed. Expecting slow phasing in -updates. One series at the time.
2020-08-20 10:44:28 Dimitri John Ledkov description secureboot-db 2020 update Expecting long period in -proposed. Expecting slow phasing in -updates. One series at the time. secureboot-db 2020 update Expecting long period in -proposed. Test to ensure certified laptops are not bricked before publishing to updates. Expecting slow phasing in -updates, at 4% a day, 25 days in total.
2020-08-20 11:21:13 Launchpad Janitor secureboot-db (Ubuntu Groovy): status New Fix Released
2020-08-20 19:37:46 Dimitri John Ledkov description secureboot-db 2020 update Expecting long period in -proposed. Test to ensure certified laptops are not bricked before publishing to updates. Expecting slow phasing in -updates, at 4% a day, 25 days in total. [Impact] * Ship 2020 dbxupdate from MS [Test Case] * Install package on Secureboot UEFI enabled system * Reboot * Observe that it still reboots [Regression Potential] * Installing this package even once will update DBX variable in the UEFI firmware and will prevent booting: - All Ubuntu, Debian, RHEL, Fedora, OpenSUSE, SUSE, Oracle Linux milestones / media released before August 2020 - Certain version of Kaspersky Labs UEFI protect software - Certain version of HPE Inc ProLiant automatic OS provisioning As they are all vulnerable to the BootHole vunlerability. For example, one will have to use 16.04.7 LTS, 18.04.5 LTS, 20.04.1 LTS installer media if they want to reinstall. If any dual boot configurations are failing to boot, one must navigated to UEFI BIOS settings and either reset DBX variables to stock values, or disable secureboot. Upgrade any systems that are now prohibited to boot. And then re-enable secureboot & reinstall secureboot-db package to reapply dbx updates. Please note simple downgrade of secureboot-db package will not achieve anything, as downgrading the package does not revert the firmware changes. [Other Info] * For more inforamtion please see https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/GRUB2SecureBootBypass
2020-08-20 19:39:00 Dimitri John Ledkov description [Impact] * Ship 2020 dbxupdate from MS [Test Case] * Install package on Secureboot UEFI enabled system * Reboot * Observe that it still reboots [Regression Potential] * Installing this package even once will update DBX variable in the UEFI firmware and will prevent booting: - All Ubuntu, Debian, RHEL, Fedora, OpenSUSE, SUSE, Oracle Linux milestones / media released before August 2020 - Certain version of Kaspersky Labs UEFI protect software - Certain version of HPE Inc ProLiant automatic OS provisioning As they are all vulnerable to the BootHole vunlerability. For example, one will have to use 16.04.7 LTS, 18.04.5 LTS, 20.04.1 LTS installer media if they want to reinstall. If any dual boot configurations are failing to boot, one must navigated to UEFI BIOS settings and either reset DBX variables to stock values, or disable secureboot. Upgrade any systems that are now prohibited to boot. And then re-enable secureboot & reinstall secureboot-db package to reapply dbx updates. Please note simple downgrade of secureboot-db package will not achieve anything, as downgrading the package does not revert the firmware changes. [Other Info] * For more inforamtion please see https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/GRUB2SecureBootBypass [Impact]  * Ship 2020 dbxupdate from MS [Test Case] * In case of multi-boot systems, please plan to boot into every operating system on your multi-boot systems and install updates as soon as your other operating system distributions publish updates for BootHole vulnerability.  * Install package on Secureboot UEFI enabled system  * Reboot  * Observe that it still reboots [Regression Potential]  * Installing this package even once will update DBX variable in the UEFI firmware and will prevent booting:  - All Ubuntu, Debian, RHEL, Fedora, OpenSUSE, SUSE, Oracle Linux milestones / media released before August 2020  - Certain version of Kaspersky Labs UEFI protect software  - Certain version of HPE Inc ProLiant automatic OS provisioning As they are all vulnerable to the BootHole vunlerability. For example, one will have to use 16.04.7 LTS, 18.04.5 LTS, 20.04.1 LTS installer media if they want to reinstall. If any dual boot configurations are failing to boot, one must navigated to UEFI BIOS settings and either reset DBX variables to stock values, or disable secureboot. Upgrade any systems that are now prohibited to boot. And then re-enable secureboot & reinstall secureboot-db package to reapply dbx updates. Please note simple downgrade of secureboot-db package will not achieve anything, as downgrading the package does not revert the firmware changes. [Other Info]  * For more inforamtion please see https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/GRUB2SecureBootBypass
2020-08-20 22:37:54 Dimitri John Ledkov description [Impact]  * Ship 2020 dbxupdate from MS [Test Case] * In case of multi-boot systems, please plan to boot into every operating system on your multi-boot systems and install updates as soon as your other operating system distributions publish updates for BootHole vulnerability.  * Install package on Secureboot UEFI enabled system  * Reboot  * Observe that it still reboots [Regression Potential]  * Installing this package even once will update DBX variable in the UEFI firmware and will prevent booting:  - All Ubuntu, Debian, RHEL, Fedora, OpenSUSE, SUSE, Oracle Linux milestones / media released before August 2020  - Certain version of Kaspersky Labs UEFI protect software  - Certain version of HPE Inc ProLiant automatic OS provisioning As they are all vulnerable to the BootHole vunlerability. For example, one will have to use 16.04.7 LTS, 18.04.5 LTS, 20.04.1 LTS installer media if they want to reinstall. If any dual boot configurations are failing to boot, one must navigated to UEFI BIOS settings and either reset DBX variables to stock values, or disable secureboot. Upgrade any systems that are now prohibited to boot. And then re-enable secureboot & reinstall secureboot-db package to reapply dbx updates. Please note simple downgrade of secureboot-db package will not achieve anything, as downgrading the package does not revert the firmware changes. [Other Info]  * For more inforamtion please see https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/GRUB2SecureBootBypass NB! do not release this update to -updates, until slow phasing is available, at 4% per day. NB! ideally phase one series at the time, to ensure we can deal with a flood of support requests if any arise. [Impact]  * Ship 2020 dbxupdate from MS [Test Case]  * In case of multi-boot systems, please plan to boot into every operating system on your multi-boot systems and install updates as soon as your other operating system distributions publish updates for BootHole vulnerability.  * Install package on Secureboot UEFI enabled system  * Reboot  * Observe that it still reboots [Regression Potential]  * Installing this package even once will update DBX variable in the UEFI firmware and will prevent booting:  - All Ubuntu, Debian, RHEL, Fedora, OpenSUSE, SUSE, Oracle Linux milestones / media released before August 2020  - Certain version of Kaspersky Labs UEFI protect software  - Certain version of HPE Inc ProLiant automatic OS provisioning As they are all vulnerable to the BootHole vunlerability. For example, one will have to use 16.04.7 LTS, 18.04.5 LTS, 20.04.1 LTS installer media if they want to reinstall. If any dual boot configurations are failing to boot, one must navigated to UEFI BIOS settings and either reset DBX variables to stock values, or disable secureboot. Upgrade any systems that are now prohibited to boot. And then re-enable secureboot & reinstall secureboot-db package to reapply dbx updates. Please note simple downgrade of secureboot-db package will not achieve anything, as downgrading the package does not revert the firmware changes. [Other Info]  * For more inforamtion please see https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/GRUB2SecureBootBypass
2020-09-02 12:55:46 Francis Ginther tags block-proposed-bionic block-proposed-focal block-proposed-xenial block-proposed-bionic block-proposed-focal block-proposed-xenial id-57571331a85e0e034520474d
2020-09-03 15:10:20 Łukasz Zemczak secureboot-db (Ubuntu Focal): status New Fix Committed
2020-09-03 15:10:22 Łukasz Zemczak bug added subscriber Ubuntu Stable Release Updates Team
2020-09-03 15:10:24 Łukasz Zemczak bug added subscriber SRU Verification
2020-09-03 15:10:26 Łukasz Zemczak tags block-proposed-bionic block-proposed-focal block-proposed-xenial id-57571331a85e0e034520474d block-proposed-bionic block-proposed-focal block-proposed-xenial id-57571331a85e0e034520474d verification-needed verification-needed-focal
2020-09-03 15:40:24 Łukasz Zemczak secureboot-db (Ubuntu Bionic): status New Fix Committed
2020-09-03 15:40:29 Łukasz Zemczak tags block-proposed-bionic block-proposed-focal block-proposed-xenial id-57571331a85e0e034520474d verification-needed verification-needed-focal block-proposed-bionic block-proposed-focal block-proposed-xenial id-57571331a85e0e034520474d verification-needed verification-needed-bionic verification-needed-focal
2020-09-03 15:45:13 Łukasz Zemczak secureboot-db (Ubuntu Xenial): status New Fix Committed
2020-09-03 15:45:17 Łukasz Zemczak tags block-proposed-bionic block-proposed-focal block-proposed-xenial id-57571331a85e0e034520474d verification-needed verification-needed-bionic verification-needed-focal block-proposed-bionic block-proposed-focal block-proposed-xenial id-57571331a85e0e034520474d verification-needed verification-needed-bionic verification-needed-focal verification-needed-xenial
2020-09-18 11:55:28 Dimitri John Ledkov tags block-proposed-bionic block-proposed-focal block-proposed-xenial id-57571331a85e0e034520474d verification-needed verification-needed-bionic verification-needed-focal verification-needed-xenial block-proposed-bionic block-proposed-xenial id-57571331a85e0e034520474d verification-needed verification-needed-bionic verification-needed-focal verification-needed-xenial
2020-09-18 12:33:58 Dimitri John Ledkov tags block-proposed-bionic block-proposed-xenial id-57571331a85e0e034520474d verification-needed verification-needed-bionic verification-needed-focal verification-needed-xenial block-proposed-bionic block-proposed-xenial id-57571331a85e0e034520474d verification-done-focal verification-needed verification-needed-bionic verification-needed-xenial
2020-09-22 12:46:16 Launchpad Janitor secureboot-db (Ubuntu Focal): status Fix Committed Fix Released
2020-09-22 12:46:22 Łukasz Zemczak removed subscriber Ubuntu Stable Release Updates Team
2020-10-20 16:07:08 Steve Langasek secureboot-db (Ubuntu Focal): status Fix Released Fix Committed
2020-10-20 16:09:08 Steve Langasek tags block-proposed-bionic block-proposed-xenial id-57571331a85e0e034520474d verification-done-focal verification-needed verification-needed-bionic verification-needed-xenial block-proposed-bionic block-proposed-xenial id-57571331a85e0e034520474d verification-failed-bionic verification-failed-focal verification-failed-xenial verification-needed
2020-10-22 13:44:17 Dimitri John Ledkov tags block-proposed-bionic block-proposed-xenial id-57571331a85e0e034520474d verification-failed-bionic verification-failed-focal verification-failed-xenial verification-needed block-proposed-bionic block-proposed-focal block-proposed-groovy block-proposed-xenial id-57571331a85e0e034520474d verification-failed-bionic verification-failed-focal verification-failed-xenial verification-needed
2020-10-29 09:57:21 Rex Tsai bug added subscriber Rex Tsai
2021-01-22 06:03:55 Mathew Hodson tags block-proposed-bionic block-proposed-focal block-proposed-groovy block-proposed-xenial id-57571331a85e0e034520474d verification-failed-bionic verification-failed-focal verification-failed-xenial verification-needed block-proposed-bionic block-proposed-focal block-proposed-xenial id-57571331a85e0e034520474d verification-needed-bionic verification-needed-focal verification-needed-xenial
2021-01-24 22:21:06 Mathew Hodson secureboot-db (Ubuntu): importance Undecided Medium
2021-01-24 22:21:18 Mathew Hodson secureboot-db (Ubuntu Trusty): importance Undecided Medium
2021-01-24 22:21:23 Mathew Hodson secureboot-db (Ubuntu Xenial): importance Undecided Medium
2021-01-24 22:21:26 Mathew Hodson secureboot-db (Ubuntu Bionic): importance Undecided Medium
2021-01-24 22:21:33 Mathew Hodson secureboot-db (Ubuntu Focal): importance Undecided Medium
2021-01-24 22:21:37 Mathew Hodson secureboot-db (Ubuntu Groovy): importance Undecided Medium
2021-07-05 13:21:27 Dimitri John Ledkov tags block-proposed-bionic block-proposed-focal block-proposed-xenial id-57571331a85e0e034520474d verification-needed-bionic verification-needed-focal verification-needed-xenial block-proposed-bionic block-proposed-focal block-proposed-xenial id-57571331a85e0e034520474d verification-failed-bionic verification-failed-focal verification-failed-xenial
2022-06-09 15:13:43 Simon Déziel bug added subscriber Simon Déziel
2023-06-01 07:57:32 Łukasz Zemczak secureboot-db (Ubuntu Bionic): status Fix Committed Confirmed
2023-12-03 06:07:26 Steve Langasek secureboot-db (Ubuntu Focal): status Fix Committed Confirmed
2023-12-03 06:07:44 Steve Langasek secureboot-db (Ubuntu Xenial): status Fix Committed Confirmed