-
Notifications
You must be signed in to change notification settings - Fork 131
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Shim 15.8 for Canonical #368
Comments
The build reproduces for me. The vendor dbx patch seems reasonable. The generation number all look OK, but we should probably agree on when the vendor specific ones are bumped. Incrementing them for every release could provide us with additional options in the future. (This is not a blocking comment.) I didn't spot any issues with the rest of the answers. |
Thanks for the review. Note for reviewers:
|
Alright! I'll send a verification email soon. If I may put my two cents in, I'd kindly nitpick on this answer:
While the CVE-2022-21499 fix implementation is (supposedly) realized by porting the commit Furthermore, the upstream changes in |
Verification email sent to |
Verification words:
|
Also re kernel patches, wording can be changed next time. Point is lockdown bypass fixes are applied and tested by the kernel team, and I assume change are made as appropriate. I don't maintain kernel code, so can't provide details off the top of my head. But if you are concerned about specific upstream changes missing I can forward that to the kernel team. |
Alright! Thanks for sharing. I wanted to double-check that everything is correct in case something changed in the meantime, as well as because I'm not a Canonical employee and don't know, what processes are being done behind the scenes, where I can't see. Furthermore, I could base the Canonical implementation as the source of truth for any downstream vendors that reuse this kernel. Hence why I wanted to make sure the ported patch mitigates CVE-2022-21499.
It's more about requesting an explanation on how the code mitigates that CVE or even better a guide, how to test the final kernel artifact out in a laboratory setting to ensure there are no security issues. Not everyone is a programmer and a guide would let others replicate the setting too and confirm that things are alright. |
Valid questions which in theory should have already had publically traceable documentation (unless i need to chase people up with a yard stick). Can you please request review from me on this PR to comment with details? |
@xnox, sure thing - assigned you. Some help will definitely come in handy as reviewing on my own would take a lot of time for checking the document for correctness, as well as learning new things - while I trust that Canonical Ltd. has the skills to maintain and test out all their software stack, I don't want to be held accountable for missing some crucial details, if there happens to be an error somewhere. That's especially true regarding technologies I don't work with - for instance I have some experience with UKIs but loading them through GRUB2 only, and this software stack is different. |
@aronowski Well @xnox is commenting as part of our kernel team, not as a separate entity, I don't think that was clear. |
The assignment is being done from organizational standpoint, at least that was my intention. I suppose next time I should only leave a request in a comment, like I did some time ago here. If that's not correct, we can always unpin an account from this GitHub issue. |
@aronowski can you confirm that you're happy with the answers? If so, I'd like to approve this. |
@jsetje, to a certain degree, yes. If it turns out I missed something and Microsoft will sign a shim for a chain that has security issues, I won't be held accountable. ;-) Notice: I haven't reviewed the complete application yet, as this one will be tough. I just spotted a curiosity as part of reviewing #362. Since we've been discussing that the following reviews are needed:
I'll unpin myself and let another person (may not be in the committee) review this one. |
@aronowski in the interest of moving this along I'm going to count you as a reviewer here. |
Signed shims received, closing. |
Confirm the following are included in your repo, checking each box:
What is the link to your tag in a repo cloned from rhboot/shim-review?
https://github.com/canonical/shim-review/blob/ubuntu-shim-amd64+arm64-20240202
What is the SHA256 hash of your final SHIM binary?
What is the link to your previous shim review request (if any, otherwise N/A)?
#298
The text was updated successfully, but these errors were encountered: