oss-sec mailing list archives
Re: CVE-2022-21499: trivial lockdown break
From: John Haxby <john.haxby () oracle com>
Date: Tue, 24 May 2022 20:18:02 +0000
On 24 May 2022, at 18:10, John Haxby <john.haxby () oracle com> wrote: Hello All, CVE-2022-21499: trivial lockdown break We recently discovered that it is trivial to break lockdown (and secureboot) using the kernel debugger: you can use the debugger to write zero into a location of your choice ... I originally posted this with a preliminary patch on linux-distros. Since then we have developed a better patch that takes into account the differences between integrity and confidentiality modes. The updated patch will be available in the Linux mainline kernel at almost the same time as I'm sending this email. I'll reply with the commit ID as soon as I have it. If anyone wants the simpler patch that I posted to linux-bistros, please let me know, but I would encourage you to take the full patch. jch
The commit that fixes this is eadb2f47a3ce ("lockdown: also lock down previous kgdb use") [1] jch [1] https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=eadb2f47a3ced5c64b23b90fd2a3463f63726066
Attachment:
signature.asc
Description: Message signed with OpenPGP
Current thread:
- CVE-2022-21499: trivial lockdown break John Haxby (May 24)
- Re: CVE-2022-21499: trivial lockdown break John Haxby (May 24)