Activity log for bug #1401532

Date Who What changed Old value New value Message
2014-12-11 13:40:32 Wouter bug added bug
2014-12-11 13:41:18 Wouter tags grub2 secureboot grub2 grub2-signed secureboot
2014-12-11 21:25:00 Marc Deslauriers information type Private Security Public Security
2014-12-11 21:25:05 Marc Deslauriers grub2-signed (Ubuntu): status New Triaged
2014-12-11 21:25:08 Marc Deslauriers grub2-signed (Ubuntu): importance Undecided Wishlist
2015-12-11 03:47:37 Mathieu Trudel-Lapierre grub2-signed (Ubuntu): status Triaged In Progress
2015-12-11 03:50:07 Mathieu Trudel-Lapierre affects grub2-signed (Ubuntu) grub2 (Ubuntu)
2015-12-11 03:50:16 Mathieu Trudel-Lapierre grub2 (Ubuntu): assignee Mathieu Trudel-Lapierre (mathieu-tl)
2015-12-14 17:11:10 Mario Limonciello bug added subscriber Mario Limonciello
2016-01-07 06:37:23 Anthony Wong bug added subscriber Ivan Hu
2016-01-07 06:37:35 Anthony Wong bug added subscriber Anthony Wong
2016-01-07 12:02:55 Mantas Mikulėnas bug added subscriber Mantas Mikulėnas
2016-01-28 20:53:49 John S. Gruber bug added subscriber John S. Gruber
2016-01-28 23:57:06 Tim Hitchins description Me and some other students have conducted some various experiments on Secure Boot enabled machines. The main focus of the tests was to circumvent Secure Boot and load unsigned kernels or kernels that have been signed with other keys. On your SecureBoot (https://wiki.ubuntu.com/SecurityTeam/SecureBoot) it is outlined that GRUB will boot unsigned kernels when the kernel is unsigned. During one of our experiments it seemed that this statement was true and that GRUB loads unsigned kernels as described on your page. We understand that for various reasons GRUB should still support the use-case when an unsigned kernel must be loaded, but with the current approach the user isn't aware if there is a whole chain of trust. For example, it could still be possible to load some malware before it boots the Operating System itself (bootkits). One of the many reasons that Secure Boot has been developed is to protect the user from these kind of attacks. With the current approach the purpose of Secure Boot is somewhat defeated, and the user doesn't know if the whole chain has been verified or not. It could easily be the case that an unsigned kernel has been loaded by Ubuntu without the user noticing. From our point of view, a better approach would be to inform the user that an unsigned kernel will be loaded and that the user can make a choice if he/she wants to proceed. The default action could be to accept the option, remember the user's option and sometimes remember the user of the fact that it is loading an unsigned kernel. This problem is of course related to GRUB itself and not to Ubuntu itself. The reason for filing this bug and informing the SecurityTeam of Ubuntu is to ask for their opinions and what your point of view is on the current approach and to see if other users classify this as a "bug". GRUB2 versions: grub-2.02~beta2, 1.34.1+2.02~beta2-9ubuntu1 Ubuntu version: Trusty (will also affect newer and older versions, GRUB specific problem) Me and some other students have conducted some various experiments on Secure Boot enabled machines. The main focus of the tests was to circumvent Secure Boot and load unsigned kernels or kernels that have been signed with other keys. On your SecureBoot (https://wiki.ubuntu.com/SecurityTeam/SecureBoot) it is outlined that GRUB will boot unsigned kernels when the kernel is unsigned. During one of our experiments it seemed that this statement was true and that GRUB loads unsigned kernels as described on your page. We understand that for various reasons GRUB should still support the use-case when an unsigned kernel must be loaded, but with the current approach the user isn't aware if there is a whole chain of trust. For example, it could still be possible to load some malware before it boots the Operating System itself (bootkits). One of the many reasons that Secure Boot has been developed is to protect the user from these kind of attacks. With the current approach the purpose of Secure Boot is somewhat defeated, and the user doesn't know if the whole chain has been verified or not. It could easily be the case that an unsigned kernel has been loaded by Ubuntu without the user noticing. From our point of view, a better approach would be to inform the user that an unsigned kernel will be loaded and that the user can make a choice if he/she wants to proceed. The default action could be to accept the option, remember the user's option and sometimes remind the user of the fact that it is loading an unsigned kernel. This problem is of course related to GRUB itself and not to Ubuntu itself. The reason for filing this bug and informing the SecurityTeam of Ubuntu is to ask for their opinions and what your point of view is on the current approach and to see if other users classify this as a "bug". GRUB2 versions: grub-2.02~beta2, 1.34.1+2.02~beta2-9ubuntu1 Ubuntu version: Trusty (will also affect newer and older versions, GRUB specific problem)
2016-02-02 20:43:42 Max Martel bug added subscriber Max Martel
2016-03-07 09:29:09 Thorsten Leemhuis bug added subscriber Thorsten Leemhuis
2016-03-09 02:40:23 Shih-Yuan Lee bug added subscriber Shih-Yuan Lee
2016-03-17 00:50:30 Chen-Han Hsiao (Stanley) bug added subscriber Chen-Han Hsiao (Stanley)
2016-04-22 13:00:14 Victor Perevertkin bug added subscriber Victor Perevertkin
2016-04-27 13:22:21 Pedro bug added subscriber Pedro
2016-05-22 05:01:33 James Johnston bug added subscriber James Johnston
2016-06-13 10:24:45 Sasa Paporovic tags grub2 grub2-signed secureboot grub2 grub2-signed secureboot xenial
2016-06-13 10:25:22 Sasa Paporovic bug added subscriber Sasa Paporovic
2016-07-23 18:09:59 Shane Synan bug added subscriber Shane Synan
2016-07-24 04:05:57 Simon May bug added subscriber Simon May
2016-09-14 15:45:12 Mathieu Trudel-Lapierre grub2 (Ubuntu): status In Progress Triaged
2016-09-14 15:45:18 Mathieu Trudel-Lapierre grub2 (Ubuntu): importance Wishlist High
2016-11-22 05:40:37 Marco bug added subscriber Marco
2016-11-26 13:16:22 Mantas Mikulėnas removed subscriber Mantas Mikulėnas
2017-03-30 20:06:47 Mathieu Trudel-Lapierre description Me and some other students have conducted some various experiments on Secure Boot enabled machines. The main focus of the tests was to circumvent Secure Boot and load unsigned kernels or kernels that have been signed with other keys. On your SecureBoot (https://wiki.ubuntu.com/SecurityTeam/SecureBoot) it is outlined that GRUB will boot unsigned kernels when the kernel is unsigned. During one of our experiments it seemed that this statement was true and that GRUB loads unsigned kernels as described on your page. We understand that for various reasons GRUB should still support the use-case when an unsigned kernel must be loaded, but with the current approach the user isn't aware if there is a whole chain of trust. For example, it could still be possible to load some malware before it boots the Operating System itself (bootkits). One of the many reasons that Secure Boot has been developed is to protect the user from these kind of attacks. With the current approach the purpose of Secure Boot is somewhat defeated, and the user doesn't know if the whole chain has been verified or not. It could easily be the case that an unsigned kernel has been loaded by Ubuntu without the user noticing. From our point of view, a better approach would be to inform the user that an unsigned kernel will be loaded and that the user can make a choice if he/she wants to proceed. The default action could be to accept the option, remember the user's option and sometimes remind the user of the fact that it is loading an unsigned kernel. This problem is of course related to GRUB itself and not to Ubuntu itself. The reason for filing this bug and informing the SecurityTeam of Ubuntu is to ask for their opinions and what your point of view is on the current approach and to see if other users classify this as a "bug". GRUB2 versions: grub-2.02~beta2, 1.34.1+2.02~beta2-9ubuntu1 Ubuntu version: Trusty (will also affect newer and older versions, GRUB specific problem) [Rationale] GRUB should help us enforce that in UEFI mode, only signed kernels are loaded. It should not silently fall back to loading unsigned kernels. [Impact] All our users booting in UEFI; on all supported releases. [Test cases] = grub2 = Booting unsigned kernels: 1) Try to boot a custom kernel 2) Verify that the kernel will not be loaded by grub (you should see an error message about the signature) Booting signed kernels: 1) Try to boot an official signed kernel (from -release or -updates) 2) Verify that the system boots normally and no warnings are shown about signature. [Regression Potential] Any failure to boot presenting as a failure to load the kernel from within grub, with an "invalid signature" type error message or not, should be investigated as a potential regression of this stable update. --- Me and some other students have conducted some various experiments on Secure Boot enabled machines. The main focus of the tests was to circumvent Secure Boot and load unsigned kernels or kernels that have been signed with other keys. On your SecureBoot (https://wiki.ubuntu.com/SecurityTeam/SecureBoot) it is outlined that GRUB will boot unsigned kernels when the kernel is unsigned. During one of our experiments it seemed that this statement was true and that GRUB loads unsigned kernels as described on your page. We understand that for various reasons GRUB should still support the use-case when an unsigned kernel must be loaded, but with the current approach the user isn't aware if there is a whole chain of trust. For example, it could still be possible to load some malware before it boots the Operating System itself (bootkits). One of the many reasons that Secure Boot has been developed is to protect the user from these kind of attacks. With the current approach the purpose of Secure Boot is somewhat defeated, and the user doesn't know if the whole chain has been verified or not. It could easily be the case that an unsigned kernel has been loaded by Ubuntu without the user noticing. From our point of view, a better approach would be to inform the user that an unsigned kernel will be loaded and that the user can make a choice if he/she wants to proceed. The default action could be to accept the option, remember the user's option and sometimes remind the user of the fact that it is loading an unsigned kernel. This problem is of course related to GRUB itself and not to Ubuntu itself. The reason for filing this bug and informing the SecurityTeam of Ubuntu is to ask for their opinions and what your point of view is on the current approach and to see if other users classify this as a "bug". GRUB2 versions: grub-2.02~beta2, 1.34.1+2.02~beta2-9ubuntu1 Ubuntu version: Trusty (will also affect newer and older versions, GRUB specific problem)
2017-03-30 20:06:55 Mathieu Trudel-Lapierre bug task added grub2-signed (Ubuntu)
2017-03-30 20:07:01 Mathieu Trudel-Lapierre grub2-signed (Ubuntu): status New Triaged
2017-03-30 20:07:04 Mathieu Trudel-Lapierre grub2-signed (Ubuntu): importance Undecided High
2017-03-30 20:07:08 Mathieu Trudel-Lapierre grub2-signed (Ubuntu): assignee Mathieu Trudel-Lapierre (cyphermox)
2017-03-30 20:07:22 Mathieu Trudel-Lapierre nominated for series Ubuntu Xenial
2017-03-30 20:07:22 Mathieu Trudel-Lapierre bug task added grub2 (Ubuntu Xenial)
2017-03-30 20:07:22 Mathieu Trudel-Lapierre bug task added grub2-signed (Ubuntu Xenial)
2017-03-30 20:07:22 Mathieu Trudel-Lapierre nominated for series Ubuntu Trusty
2017-03-30 20:07:22 Mathieu Trudel-Lapierre bug task added grub2 (Ubuntu Trusty)
2017-03-30 20:07:22 Mathieu Trudel-Lapierre bug task added grub2-signed (Ubuntu Trusty)
2017-03-30 20:07:22 Mathieu Trudel-Lapierre nominated for series Ubuntu Zesty
2017-03-30 20:07:22 Mathieu Trudel-Lapierre bug task added grub2 (Ubuntu Zesty)
2017-03-30 20:07:22 Mathieu Trudel-Lapierre bug task added grub2-signed (Ubuntu Zesty)
2017-03-30 20:07:22 Mathieu Trudel-Lapierre nominated for series Ubuntu Yakkety
2017-03-30 20:07:22 Mathieu Trudel-Lapierre bug task added grub2 (Ubuntu Yakkety)
2017-03-30 20:07:22 Mathieu Trudel-Lapierre bug task added grub2-signed (Ubuntu Yakkety)
2017-03-31 04:22:33 Robert Liu bug added subscriber Robert Liu
2017-04-04 09:58:01 Adam Heczko bug added subscriber Adam Heczko
2017-04-08 01:48:31 Launchpad Janitor grub2 (Ubuntu Zesty): status Triaged Fix Released
2017-04-08 01:49:16 Launchpad Janitor grub2-signed (Ubuntu Zesty): status Triaged Fix Released
2017-04-11 00:37:12 Mathieu Trudel-Lapierre grub2 (Ubuntu Zesty): status Fix Released Triaged
2017-04-11 00:37:25 Mathieu Trudel-Lapierre grub2-signed (Ubuntu Zesty): status Fix Released Triaged
2017-04-29 16:08:56 Chris Mayo bug added subscriber Chris Mayo
2017-05-18 01:59:37 Launchpad Janitor grub2 (Ubuntu Trusty): status New Confirmed
2017-05-18 01:59:37 Launchpad Janitor grub2-signed (Ubuntu Trusty): status New Confirmed
2017-05-18 01:59:37 Launchpad Janitor grub2 (Ubuntu Xenial): status New Confirmed
2017-05-18 01:59:37 Launchpad Janitor grub2-signed (Ubuntu Xenial): status New Confirmed
2017-05-18 01:59:37 Launchpad Janitor grub2 (Ubuntu Yakkety): status New Confirmed
2017-05-18 01:59:37 Launchpad Janitor grub2-signed (Ubuntu Yakkety): status New Confirmed
2017-05-18 02:00:14 Reuben Lifshay bug added subscriber Reuben Lifshay
2017-11-14 04:14:03 Launchpad Janitor grub2 (Ubuntu): status Triaged Fix Released
2017-11-14 19:53:15 Victor Perevertkin removed subscriber Victor Perevertkin
2018-09-05 21:02:51 Mathieu Trudel-Lapierre bug task deleted grub2 (Ubuntu Zesty)
2018-09-05 21:02:58 Mathieu Trudel-Lapierre bug task deleted grub2 (Ubuntu Yakkety)
2018-09-05 21:03:05 Mathieu Trudel-Lapierre bug task deleted grub2-signed (Ubuntu Yakkety)
2018-09-05 21:03:10 Mathieu Trudel-Lapierre bug task deleted grub2-signed (Ubuntu Zesty)
2018-09-05 21:03:20 Mathieu Trudel-Lapierre nominated for series Ubuntu Bionic
2018-09-05 21:03:20 Mathieu Trudel-Lapierre bug task added grub2 (Ubuntu Bionic)
2018-09-05 21:03:20 Mathieu Trudel-Lapierre bug task added grub2-signed (Ubuntu Bionic)
2018-09-05 21:03:30 Mathieu Trudel-Lapierre grub2 (Ubuntu Bionic): status New In Progress
2018-09-05 21:03:35 Mathieu Trudel-Lapierre grub2-signed (Ubuntu Bionic): status New In Progress
2018-09-05 21:04:06 Mathieu Trudel-Lapierre grub2-signed (Ubuntu Bionic): assignee Mathieu Trudel-Lapierre (cyphermox)
2018-09-05 21:04:09 Mathieu Trudel-Lapierre grub2 (Ubuntu Bionic): assignee Mathieu Trudel-Lapierre (cyphermox)
2018-09-05 21:04:15 Mathieu Trudel-Lapierre grub2 (Ubuntu Xenial): status Confirmed Triaged
2018-09-05 21:04:18 Mathieu Trudel-Lapierre grub2 (Ubuntu Trusty): status Confirmed Triaged
2018-09-05 21:04:22 Mathieu Trudel-Lapierre grub2-signed (Ubuntu Trusty): status Confirmed Triaged
2018-09-05 21:04:27 Mathieu Trudel-Lapierre grub2-signed (Ubuntu): status Triaged Fix Released
2018-09-05 21:04:31 Mathieu Trudel-Lapierre grub2-signed (Ubuntu Xenial): status Confirmed Triaged
2018-09-05 21:04:35 Mathieu Trudel-Lapierre grub2-signed (Ubuntu Bionic): importance Undecided High
2018-09-05 21:04:37 Mathieu Trudel-Lapierre grub2-signed (Ubuntu Xenial): importance Undecided High
2018-09-05 21:04:39 Mathieu Trudel-Lapierre grub2-signed (Ubuntu Trusty): importance Undecided High
2018-09-05 21:04:41 Mathieu Trudel-Lapierre grub2 (Ubuntu Bionic): importance Undecided High
2018-09-05 21:04:43 Mathieu Trudel-Lapierre grub2 (Ubuntu Xenial): importance Undecided High
2018-09-05 21:04:45 Mathieu Trudel-Lapierre grub2 (Ubuntu Trusty): importance Undecided High
2018-09-18 09:16:56 Paddy Landau bug added subscriber Paddy Landau
2019-01-02 13:03:29 Tom Reynolds bug added subscriber Tom Reynolds
2019-02-07 20:09:45 Steve Langasek grub2 (Ubuntu Bionic): status In Progress Fix Committed
2019-02-07 20:09:49 Steve Langasek bug added subscriber Ubuntu Stable Release Updates Team
2019-02-07 20:09:53 Steve Langasek bug added subscriber SRU Verification
2019-02-07 20:10:07 Steve Langasek tags grub2 grub2-signed secureboot xenial grub2 grub2-signed secureboot verification-needed verification-needed-bionic xenial
2019-02-07 20:20:43 Steve Langasek grub2-signed (Ubuntu Bionic): status In Progress Fix Committed
2019-02-08 16:01:24 Mathieu Trudel-Lapierre tags grub2 grub2-signed secureboot verification-needed verification-needed-bionic xenial grub2 grub2-signed secureboot verification-done-bionic verification-needed xenial
2019-02-08 16:01:33 Mathieu Trudel-Lapierre tags grub2 grub2-signed secureboot verification-done-bionic verification-needed xenial grub2 grub2-signed secureboot verification-done-bionic xenial
2019-02-08 19:13:18 Launchpad Janitor grub2 (Ubuntu Bionic): status Fix Committed Fix Released
2019-02-08 19:13:29 Steve Langasek removed subscriber Ubuntu Stable Release Updates Team
2019-02-08 19:13:41 Launchpad Janitor grub2-signed (Ubuntu Bionic): status Fix Committed Fix Released
2019-03-15 10:08:18 semreh bug added subscriber semreh
2019-03-22 14:48:23 Mathieu Trudel-Lapierre grub2 (Ubuntu Trusty): status Triaged In Progress
2019-03-22 14:48:27 Mathieu Trudel-Lapierre grub2-signed (Ubuntu Trusty): status Triaged In Progress
2019-03-22 14:48:29 Mathieu Trudel-Lapierre grub2 (Ubuntu Trusty): assignee Mathieu Trudel-Lapierre (cyphermox)
2019-03-22 14:48:33 Mathieu Trudel-Lapierre grub2-signed (Ubuntu Trusty): assignee Mathieu Trudel-Lapierre (cyphermox)
2019-03-22 14:48:35 Mathieu Trudel-Lapierre grub2-signed (Ubuntu Xenial): assignee Mathieu Trudel-Lapierre (cyphermox)
2019-03-22 14:48:37 Mathieu Trudel-Lapierre grub2 (Ubuntu Xenial): assignee Mathieu Trudel-Lapierre (cyphermox)
2019-03-22 14:48:40 Mathieu Trudel-Lapierre grub2 (Ubuntu Xenial): status Triaged In Progress
2019-03-22 14:48:44 Mathieu Trudel-Lapierre grub2-signed (Ubuntu Xenial): status Triaged In Progress
2019-03-22 19:40:10 Steve Langasek grub2 (Ubuntu Trusty): status In Progress Fix Committed
2019-03-22 19:40:15 Steve Langasek bug added subscriber Ubuntu Stable Release Updates Team
2019-03-22 19:40:33 Steve Langasek tags grub2 grub2-signed secureboot verification-done-bionic xenial grub2 grub2-signed secureboot verification-done-bionic verification-needed verification-needed-trusty xenial
2019-03-22 20:09:48 Steve Langasek grub2-signed (Ubuntu Trusty): status In Progress Fix Committed
2019-04-01 15:56:06 Mathieu Trudel-Lapierre tags grub2 grub2-signed secureboot verification-done-bionic verification-needed verification-needed-trusty xenial grub2 grub2-signed secureboot verification-done-bionic verification-done-trusty verification-needed xenial
2019-04-01 16:04:32 Mathieu Trudel-Lapierre tags grub2 grub2-signed secureboot verification-done-bionic verification-done-trusty verification-needed xenial grub2 grub2-signed secureboot verification-done-bionic verification-failed-trusty verification-needed xenial
2019-04-01 16:13:24 Steve Langasek tags grub2 grub2-signed secureboot verification-done-bionic verification-failed-trusty verification-needed xenial grub2 grub2-signed secureboot verification-done-bionic verification-needed verification-needed-trusty xenial
2019-04-01 21:17:13 Mathieu Trudel-Lapierre tags grub2 grub2-signed secureboot verification-done-bionic verification-needed verification-needed-trusty xenial grub2 grub2-signed secureboot verification-done-bionic verification-done-trusty xenial
2019-04-09 19:37:06 Launchpad Janitor grub2 (Ubuntu Trusty): status Fix Committed Fix Released
2019-04-09 19:37:14 Launchpad Janitor grub2-signed (Ubuntu Trusty): status Fix Committed Fix Released
2020-07-29 17:54:52 Launchpad Janitor grub2 (Ubuntu Xenial): status In Progress Fix Released
2020-07-29 17:54:52 Launchpad Janitor cve linked 2020-10713
2020-07-29 17:54:52 Launchpad Janitor cve linked 2020-14308
2020-07-29 17:54:52 Launchpad Janitor cve linked 2020-14309
2020-07-29 17:54:52 Launchpad Janitor cve linked 2020-14310
2020-07-29 17:54:52 Launchpad Janitor cve linked 2020-14311
2020-07-29 17:54:52 Launchpad Janitor cve linked 2020-15705
2020-07-29 17:54:52 Launchpad Janitor cve linked 2020-15706
2020-07-29 17:54:52 Launchpad Janitor cve linked 2020-15707
2020-08-04 19:54:02 Marcelo Cerri grub2-signed (Ubuntu Xenial): status In Progress Fix Released
2020-08-05 13:07:31 Chen-Han Hsiao (Stanley) removed subscriber Chen-Han Hsiao (Stanley)