]> git.proxmox.com Git - mirror_ubuntu-jammy-kernel.git/commit
UBUNTU: SAUCE: debug: Lock down kgdb
authorStephen Brennan <stephen.s.brennan@oracle.com>
Thu, 14 Apr 2022 20:27:45 +0000 (13:27 -0700)
committerThadeu Lima de Souza Cascardo <cascardo@canonical.com>
Sat, 21 May 2022 00:23:12 +0000 (21:23 -0300)
commit11a6af597f8d498dda371fa6dafb478f946113fd
tree2e64e41ba61c0174ef07bb7da83e5ca8f6d9fc99
parentb3e2cb756994b810c9486627ca5b889099cc54d8
UBUNTU: SAUCE: debug: Lock down kgdb

KGDB and KDB allow read and write access to kernel memory, and thus
should not be allowed during lockdown. An attacker with access to a
serial port (for example, via a hypervisor console, which some cloud
vendors provide over the network) could trigger the debugger and use it
to bypass lockdown. Ensure KDB and KGDB cannot be used during lockdown.

This fixes CVE-2022-21499.

Signed-off-by: Stephen Brennan <stephen.s.brennan@oracle.com>
CVE-2022-21499
Signed-off-by: Thadeu Lima de Souza Cascardo <cascardo@canonical.com>
Acked-by: Kamal Mostafa <kamal@canonical.com>
Acked-by: Dimitri John Ledkov <dimitri.ledkov@canonical.com>
Acked-by: Andrea Righi <andrea.righi@canonical.com>
include/linux/security.h
kernel/debug/debug_core.c
security/security.c