-
Notifications
You must be signed in to change notification settings - Fork 59
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Response to CVE-2020-10713 (GRUB 2 Boot Hole) #587
Comments
This is my opinion: No one should apply this update in a panic. Secure Boot today only comes into play if someone has already compromised a system with root-equivalent privileges. Everyone should continue to focus on preventing that scenario - apply security updates, verify integrity of privileged (and all) software, ensure systems administrators are using multi-factor authentication - the list goes on. There are also reports of regressions in booting on some machines in response to this: https://bugzilla.redhat.com/show_bug.cgi?id=1861977 Also, it doesn't look like there are any Fedora builds for this yet AFAICS. The last grub build was a month ago, and last shim build was much longer ago than that. But once those happen and Fedora makes updates FCOS should pick this change up as part of the next release, and FCOS users should consider implementing a "periodic rolling reprovisioning" strategy if they haven't already. (For example, re-PXE a metal server after it's been up for more than 2 months, delete cloud images after a likely shorter period of time too and scale up a new one in its place, etc.) |
Thanks for the perspective. Once FCOS ships the fixed bootloader binaries, do you (or anyone else) have opinions about whether we should provide a manual update path? My personal opinion is that we should because unlike RHCOS, FCOS is friendlier to the single node/pet path, even if we try to steer people towards Ignition as source of truth. |
Well I was working on https://github.com/coreos/bootupd to enable both manual and automatic updates. But it needs a lot of work and care. It is certainly tempting to make a "script" just for this one event. One thing that probably needs to be designed in is tooling to boot from a Live ISO and downgrade for situations like boot regression above. |
We discussed this in the meeting today. We were lucky enough in our meeting to be joined by @vathpela who gave us some good information. Summary:
|
https://github.com/coreos/bootupd/ is now in "stable preview" and shipping in FCOS. The updated grub that fixes this seems to be https://bodhi.fedoraproject.org/updates/FEDORA-2020-e87e901a8d |
See: https://access.redhat.com/security/vulnerabilities/grub2bootloader
We should probably send an email to the mailing list to provide recommendations. We're in the same boat as RHCOS here, in that the bootloader isn't automatically updated.
We can match RHCOS and say "reprovision", though would be nice if we could also provide instructions for how to manually update the bootloader too.
The text was updated successfully, but these errors were encountered: