Commit Graph

532 Commits

Author SHA1 Message Date
Gary Ching-Pang Lin
ed8363efd2 Copy the MOK blacklist to a RT variable
Signed-off-by: Gary Ching-Pang Lin <glin@suse.com>
2015-06-16 11:41:32 -04:00
Gary Ching-Pang Lin
c9cf07a0e0 MokManager: Write the hash list properly
also return to the previous entry in the list

Signed-off-by: Gary Ching-Pang Lin <glin@suse.com>
2015-06-16 11:41:32 -04:00
Gary Ching-Pang Lin
c9261eab2a MokManager: Match all hashes in the list
Signed-off-by: Gary Ching-Pang Lin <glin@suse.com>
2015-06-16 11:41:32 -04:00
Gary Ching-Pang Lin
7659efe09d MokManager: delete the hash properly
Signed-off-by: Gary Ching-Pang Lin <glin@suse.com>
2015-06-16 11:41:32 -04:00
Gary Ching-Pang Lin
8d7e85a289 MokManager: show the hash list properly
Signed-off-by: Gary Ching-Pang Lin <glin@suse.com>
2015-06-16 11:41:32 -04:00
Gary Ching-Pang Lin
10a2161a90 Support MOK blacklist
The new blacklist, MokListX, stores the keys and hashes that are
banned.

Signed-off-by: Gary Ching-Pang Lin <glin@suse.com>
2015-06-16 11:41:32 -04:00
Peter Jones
1fefa29c34 Fix console_print_box*() parameters.
When we made lib build with the correct CFLAGS, it inherited
-Werror=sign-compare, and I fixed up some parameters on
console_print_box() and console_print_box_at() to avoid sign comparison
errors.

The fixups were *completely wrong*, as some behavior relies on negative
values.  So this fixes them in a completely different way, by casting
appropriately to signed types where we're doing comparisons.

Signed-off-by: Peter Jones <pjones@redhat.com>
2015-06-16 11:41:32 -04:00
Peter Jones
0a7003faec Ensure that apps launched by shim get correct BS->Exit() behavior
Right now applications run by shim get our wrapper for Exit(), but it
doesn't do as much cleanup as it should - shim itself also exits, but
currently is not doing all the cleanup it should be doing.

This changes it so all of shim's cleanup is also performed.

Based on a patch and lots of review from Gary Lin.

Signed-off-by: Peter Jones <pjones@redhat.com>
2015-06-11 13:25:56 -04:00
Peter Jones
b9f98904ba Don't leave in_protocol==1 when shim_verify() isn't enforcing.
Right now if shim_verify() sees secure_mode()==0, it exits with
EFI_SUCCESS, but accidentally leaves in_protocol=1.  This means any
other call will have supressed error/warning messages.

That's wrong, so don't do it.

Signed-off-by: Peter Jones <pjones@redhat.com>
2015-06-11 13:20:09 -04:00
Peter Jones
8837b9054f Only run MokManager if asked or a security violation occurs.
Don't run MokManager on any random error from start_image(second_stage);
only try it if it /is/ the second stage, or if start_image gave us
EFI_SECURITY_VIOLATION.

Signed-off-by: Peter Jones <pjones@redhat.com>
2015-06-04 10:19:30 -04:00
Mathieu Trudel-Lapierre
c2f285a93f More GCC 5 fixes: stdarg.h and other include tweaks, cherry-pick from
d51739a4.
2015-05-12 21:51:24 -04:00
Mathieu Trudel-Lapierre
d6f876b850 Fix build with GCC 5, forcing -std=gnu89 to not rely on stdint.h
required by efibind.h, and not found with -nostdinc. (LP: #1429978)
2015-05-12 21:48:09 -04:00
Gary Ching-Pang Lin
80bcb57823 Make the build failed with objcopy < 2.24
The wildcard support was introduced in objcopy since binutils 2.24.
However, objcopy < 2.24 never issues any warning message with the
wildcard and a faulty binary will be generated. This commit makes
the build failed as a notification for the usage of binutils < 2.24.

Signed-off-by: Gary Ching-Pang Lin <glin@suse.com>
2015-05-12 13:52:22 -04:00
Gary Ching-Pang Lin
f3653b08a4 Update Cryptlib and openssl
Update Cryptlib to r16559 and openssl to 0.9.8zf

Signed-off-by: Gary Ching-Pang Lin <glin@suse.com>
2015-05-12 13:51:02 -04:00
Steve Langasek
8fa98d6dcd releasing package shim version 0.8-0ubuntu2 2015-05-12 17:48:34 +00:00
Mathieu Trudel-Lapierre
acd2cc1e4f * New upstream release.
- Clarify meaning of insecure_mode. (LP: #1384973)
* debian/patches/CVE-2014-3675.patch, debian/patches/CVE-2014-3677.patch,
  debian/patches/0001-Update-openssl-to-0.9.8za.patch: dropped, included
  in the upstream release.
* debian/patches/sbsigntool-not-pesign,debian/patches/second-stage-path:
  refreshed.
2015-05-11 19:50:49 -04:00
Mathieu Trudel-Lapierre
86a08c30b4 Reapplying all patches 2015-05-10 10:03:20 -04:00
Mathieu Trudel-Lapierre
37358ddb1c Add bug tag for insecure_mode semantics changes in 0.8. 2015-05-07 16:03:19 -04:00
Mathieu Trudel-Lapierre
28da53af72 debian/patches/sbsigntool-not-pesign,debian/patches/second-stage-path:
refreshed.
2015-05-06 14:02:40 -04:00
Mathieu Trudel-Lapierre
e42efbd92b debian/patches/CVE-2014-3675.patch, debian/patches/CVE-2014-3677.patch,
debian/patches/0001-Update-openssl-to-0.9.8za.patch: dropped, included
in the upstream release.
2015-05-06 14:01:16 -04:00
Mathieu Trudel-Lapierre
4c03444e7c New upstream release. 2015-05-06 09:50:11 -04:00
Mathieu Trudel-Lapierre
a14921c594 Import upstream version 0.8 2015-05-06 09:49:41 -04:00
Mathieu Trudel-Lapierre
2283f5e85d Unapplying patches to prevent spurious conflicts. 2015-05-06 09:49:30 -04:00
Steve Langasek
3967dc6524 Merge upstream git branch for release 0.7 2015-05-05 23:32:33 +00:00
Steve Langasek
8b0389dd27 Fix the version number; this was uploaded for some reason as -0ubuntu4, not -0ubuntu3. 2015-05-05 08:59:32 -07:00
Matthew Garrett
f3af1acfec Explicitly request sysv-style ELF hash sections
We depend on there being a .hash section in the binary, and that's not
the case on distributions that default to building with gnu-style ELF
hashes. Explicitly request sysv-style hashes in order to avoid building
broken binaries.

Signed-off-by: Matthew Garrett <mjg59@coreos.com>
2015-04-15 13:30:52 -04:00
Peter Jones
683b564332 gcc 5.0 changes some include bits, so copy what arm does on x86.
Basically they messed around with stdarg some and now we need to do it
the other way.

Signed-off-by: Peter Jones <pjones@redhat.com>
2015-04-13 19:55:25 -04:00
Peter Jones
344b9cbd0b Make lib/ use the right CFLAGS.
Signed-off-by: Peter Jones <pjones@redhat.com>
2015-04-13 19:55:25 -04:00
Peter Jones
1f23ecc300 Make lib/ build right with the cflags it should be using...
... but isn't.

Signed-off-by: Peter Jones <pjones@redhat.com>
2015-04-13 19:55:25 -04:00
Laszlo Ersek
0ea5b3e3b7 Fix length of allocated buffer for boot option comparison.
The following commit:

  commit 4aac8a1179
  Author: Gary Ching-Pang Lin <glin@suse.com>
  Date:   Thu Mar 6 10:57:02 2014 +0800

    [fallback] Fix the data size for boot option comparison

corrected the data size used for comparison, but also reduced the
allocation so it doesn't include the trailing UTF16LE '\0\0' at the
end of the string, with the result that the trailer of the buffer
containing the string is overwritten, which OVMF detects as memory
corruption.

Increase the size of the storage buffer in a few places to correct
this problem.

Signed-off-by: Richard W.M. Jones <rjones@redhat.com>
Cc: Laszlo Ersek <lersek@redhat.com>
Cc: Gary Ching-Pang Lin <glin@suse.com>
2015-04-13 19:55:25 -04:00
Richard W.M. Jones
cb7dec11f2 fallback: Fix comparison between signed and unsigned in debugging code.
fallback.c: In function ‘update_boot_order’:
fallback.c:334:17: error: comparison between signed and unsigned integer expressions [-Werror=sign-compare]
  for (j = 0 ; j < size / sizeof (CHAR16); j++)
                   ^
fallback.c: In function ‘add_to_boot_list’:
fallback.c:402:16: error: comparison between signed and unsigned integer expressions [-Werror=sign-compare]
  for (i = 0; i < s; i++) {
                  ^

Signed-off-by: Richard W.M. Jones <rjones@redhat.com>
2015-04-13 19:55:25 -04:00
Peter Jones
8d535fc962 Don't install our protocols if we're not in secure mode.
System services haven't been hooked if we're not in secure mode, so
do_exit() will never be called.  In this case shim never gets control
once grub exits, which means if booting fails and the firmware tries
another boot option, it'll attempt to talk to the shim protocol we
installed.

This is wrong, because it is allowed to have been cleared from ram at
this time, since the task it's under has exited.

So just don't install the protocols when we're not enforcing.

This version also has a message and a 2-second stall after calling
start_image(), so that we can tell if we are on the expected return path
of our execution flow.
2015-04-13 19:55:25 -04:00
Peter Jones
96cf3c015c Align the sections we're loading, and check for validity /after/ discarding.
Turns out a) the codegen on aarch64 generates code that has real
alignment needs, and b) if we check the length of discardable sections
before discarding them, we error for no reason.

So do the error checking in the right order, and always enforce some
alignment because we know we have to.

Signed-off-by: Peter Jones <pjones@redhat.com>
2015-04-13 19:55:25 -04:00
Gary Ching-Pang Lin
ed4c5dbc84 Add nostdinc to the CFLAGS for lib
We don't need the headers from the standard include path.

Signed-off-by: Gary Ching-Pang Lin <glin@suse.com>
2014-12-11 09:48:50 -05:00
Peter Jones
7361f67dbd Bump version to 0.8 2014-10-13 16:41:51 -04:00
Steve Langasek
e82e770609 releasing package shim version 0.7-0ubuntu3 2014-10-08 06:41:01 +00:00
Steve Langasek
3586772f0c * SECURITY UPDATE: heap overflow and out-of-bounds read access when
parsing DHCPv6 information
  - debian/patches/CVE-2014-3675.patch: apply proper bounds checking
    when parsing data provided in DHCPv6 packets.
  - CVE-2014-3675
  - CVE-2014-3676
* SECURITY UPDATE: memory corruption when processing user-provided key
  lists
  - debian/patches/CVE-2014-3677.patch: detect malformed machine owner
    key (MOK) lists and ignore them, avoiding possible memory corruption.
  - CVE-2014-3677
2014-10-08 06:40:28 +00:00
Steve Langasek
bc9b5d6386 releasing package shim version 0.7-0ubuntu2 2014-10-07 16:20:10 -07:00
Steve Langasek
4960f3580e Update debian/patches/prototypes with some new declarations needed for
openssl 0.9.8za update.
2014-10-07 16:20:02 -07:00
Steve Langasek
172647da18 Restore debian/patches/prototypes, which still is needed on shim 0.7
but only detected on the buildds.
2014-10-07 09:40:06 -07:00
Steve Langasek
db8383ad9f releasing package shim version 0.7-0ubuntu1 2014-10-07 05:40:45 +00:00
Steve Langasek
1e963007c0 debian/patches/0001-Update-openssl-to-0.9.8za.patch: cherry-pick
openssl 0.9.8za in via upstream.
2014-10-07 05:35:11 +00:00
Steve Langasek
e34fca619d Drop prototypes patch, apparently not needed upstream 2014-10-07 00:30:44 +00:00
Steve Langasek
c61b06bc69 drop most patches, included upstream. 2014-10-07 00:30:39 +00:00
Steve Langasek
59945b252e Merge upstream version 0.7 2014-10-06 17:17:33 -07:00
Steve Langasek
72bb39c023 Import upstream version 0.7 2014-10-06 15:39:48 -07:00
Peter Jones
159609ee4e Correctly reject bad tftp addresses earlier, rather than later.
This check is for end == NULL but was meant to be *end == '\0'.  Without
this change, we'll pass a plausibly bad address (i.e. one with no ']' at
the end) to Mtftp(... READ_FILE ...), which should fail correctly, but
our error messaging will be inconsistent.

Signed-off-by: Peter Jones <pjones@redhat.com>
2014-10-02 01:01:54 -04:00
Peter Jones
7d953d6722 Use -Werror=sign-compare .
I'm going to have to fix any errors that have this anyway, so may as
well do it here properly.

Signed-off-by: Peter Jones <pjones@redhat.com>
2014-10-02 01:01:54 -04:00
Peter Jones
a6dfd3e426 Make another integer compare be signed/unsigned safe as well.
Signed-off-by: Peter Jones <pjones@redhat.com>
2014-10-02 01:01:54 -04:00
Sebastian Krahmer
0dbc0e7f42 OOB access when parsing MOK List/Certificates on MOK enrollment 2014-10-02 01:01:54 -04:00