Commit Graph

1445 Commits

Author SHA1 Message Date
Peter Jones
344b9cbd0b Make lib/ use the right CFLAGS.
Signed-off-by: Peter Jones <pjones@redhat.com>
2015-04-13 19:55:25 -04:00
Peter Jones
605be9f179 Make lib/ use the right CFLAGS.
Signed-off-by: Peter Jones <pjones@redhat.com>
2015-04-13 19:55:25 -04:00
Peter Jones
1f23ecc300 Make lib/ build right with the cflags it should be using...
... but isn't.

Signed-off-by: Peter Jones <pjones@redhat.com>
2015-04-13 19:55:25 -04:00
Peter Jones
7fdbd9d48a Make lib/ build right with the cflags it should be using...
... but isn't.

Signed-off-by: Peter Jones <pjones@redhat.com>
2015-04-13 19:55:25 -04:00
Laszlo Ersek
0ea5b3e3b7 Fix length of allocated buffer for boot option comparison.
The following commit:

  commit 4aac8a1179
  Author: Gary Ching-Pang Lin <glin@suse.com>
  Date:   Thu Mar 6 10:57:02 2014 +0800

    [fallback] Fix the data size for boot option comparison

corrected the data size used for comparison, but also reduced the
allocation so it doesn't include the trailing UTF16LE '\0\0' at the
end of the string, with the result that the trailer of the buffer
containing the string is overwritten, which OVMF detects as memory
corruption.

Increase the size of the storage buffer in a few places to correct
this problem.

Signed-off-by: Richard W.M. Jones <rjones@redhat.com>
Cc: Laszlo Ersek <lersek@redhat.com>
Cc: Gary Ching-Pang Lin <glin@suse.com>
2015-04-13 19:55:25 -04:00
Laszlo Ersek
6b2510522f Fix length of allocated buffer for boot option comparison.
The following commit:

  commit 4aac8a1179
  Author: Gary Ching-Pang Lin <glin@suse.com>
  Date:   Thu Mar 6 10:57:02 2014 +0800

    [fallback] Fix the data size for boot option comparison

corrected the data size used for comparison, but also reduced the
allocation so it doesn't include the trailing UTF16LE '\0\0' at the
end of the string, with the result that the trailer of the buffer
containing the string is overwritten, which OVMF detects as memory
corruption.

Increase the size of the storage buffer in a few places to correct
this problem.

Signed-off-by: Richard W.M. Jones <rjones@redhat.com>
Cc: Laszlo Ersek <lersek@redhat.com>
Cc: Gary Ching-Pang Lin <glin@suse.com>
2015-04-13 19:55:25 -04:00
Richard W.M. Jones
cb7dec11f2 fallback: Fix comparison between signed and unsigned in debugging code.
fallback.c: In function ‘update_boot_order’:
fallback.c:334:17: error: comparison between signed and unsigned integer expressions [-Werror=sign-compare]
  for (j = 0 ; j < size / sizeof (CHAR16); j++)
                   ^
fallback.c: In function ‘add_to_boot_list’:
fallback.c:402:16: error: comparison between signed and unsigned integer expressions [-Werror=sign-compare]
  for (i = 0; i < s; i++) {
                  ^

Signed-off-by: Richard W.M. Jones <rjones@redhat.com>
2015-04-13 19:55:25 -04:00
Richard W.M. Jones
90c65f72f8 fallback: Fix comparison between signed and unsigned in debugging code.
fallback.c: In function ‘update_boot_order’:
fallback.c:334:17: error: comparison between signed and unsigned integer expressions [-Werror=sign-compare]
  for (j = 0 ; j < size / sizeof (CHAR16); j++)
                   ^
fallback.c: In function ‘add_to_boot_list’:
fallback.c:402:16: error: comparison between signed and unsigned integer expressions [-Werror=sign-compare]
  for (i = 0; i < s; i++) {
                  ^

Signed-off-by: Richard W.M. Jones <rjones@redhat.com>
2015-04-13 19:55:25 -04:00
Peter Jones
8d535fc962 Don't install our protocols if we're not in secure mode.
System services haven't been hooked if we're not in secure mode, so
do_exit() will never be called.  In this case shim never gets control
once grub exits, which means if booting fails and the firmware tries
another boot option, it'll attempt to talk to the shim protocol we
installed.

This is wrong, because it is allowed to have been cleared from ram at
this time, since the task it's under has exited.

So just don't install the protocols when we're not enforcing.

This version also has a message and a 2-second stall after calling
start_image(), so that we can tell if we are on the expected return path
of our execution flow.
2015-04-13 19:55:25 -04:00
Peter Jones
5195d7d31b Don't install our protocols if we're not in secure mode.
System services haven't been hooked if we're not in secure mode, so
do_exit() will never be called.  In this case shim never gets control
once grub exits, which means if booting fails and the firmware tries
another boot option, it'll attempt to talk to the shim protocol we
installed.

This is wrong, because it is allowed to have been cleared from ram at
this time, since the task it's under has exited.

So just don't install the protocols when we're not enforcing.

This version also has a message and a 2-second stall after calling
start_image(), so that we can tell if we are on the expected return path
of our execution flow.
2015-04-13 19:55:25 -04:00
Peter Jones
96cf3c015c Align the sections we're loading, and check for validity /after/ discarding.
Turns out a) the codegen on aarch64 generates code that has real
alignment needs, and b) if we check the length of discardable sections
before discarding them, we error for no reason.

So do the error checking in the right order, and always enforce some
alignment because we know we have to.

Signed-off-by: Peter Jones <pjones@redhat.com>
2015-04-13 19:55:25 -04:00
Peter Jones
d01421eb5a Align the sections we're loading, and check for validity /after/ discarding.
Turns out a) the codegen on aarch64 generates code that has real
alignment needs, and b) if we check the length of discardable sections
before discarding them, we error for no reason.

So do the error checking in the right order, and always enforce some
alignment because we know we have to.

Signed-off-by: Peter Jones <pjones@redhat.com>
2015-04-13 19:55:25 -04:00
Gary Ching-Pang Lin
ed4c5dbc84 Add nostdinc to the CFLAGS for lib
We don't need the headers from the standard include path.

Signed-off-by: Gary Ching-Pang Lin <glin@suse.com>
2014-12-11 09:48:50 -05:00
Gary Ching-Pang Lin
361716dd4a Add nostdinc to the CFLAGS for lib
We don't need the headers from the standard include path.

Signed-off-by: Gary Ching-Pang Lin <glin@suse.com>
2014-12-11 09:48:50 -05:00
Peter Jones
7361f67dbd Bump version to 0.8 2014-10-13 16:41:51 -04:00
Peter Jones
4316fbd2a2 Bump version to 0.8 2014-10-13 16:41:51 -04:00
Steve Langasek
e82e770609 releasing package shim version 0.7-0ubuntu3 2014-10-08 06:41:01 +00:00
Steve Langasek
3586772f0c * SECURITY UPDATE: heap overflow and out-of-bounds read access when
parsing DHCPv6 information
  - debian/patches/CVE-2014-3675.patch: apply proper bounds checking
    when parsing data provided in DHCPv6 packets.
  - CVE-2014-3675
  - CVE-2014-3676
* SECURITY UPDATE: memory corruption when processing user-provided key
  lists
  - debian/patches/CVE-2014-3677.patch: detect malformed machine owner
    key (MOK) lists and ignore them, avoiding possible memory corruption.
  - CVE-2014-3677
2014-10-08 06:40:28 +00:00
Steve Langasek
bc9b5d6386 releasing package shim version 0.7-0ubuntu2 2014-10-07 16:20:10 -07:00
Steve Langasek
4960f3580e Update debian/patches/prototypes with some new declarations needed for
openssl 0.9.8za update.
2014-10-07 16:20:02 -07:00
Steve Langasek
172647da18 Restore debian/patches/prototypes, which still is needed on shim 0.7
but only detected on the buildds.
2014-10-07 09:40:06 -07:00
Steve Langasek
db8383ad9f releasing package shim version 0.7-0ubuntu1 2014-10-07 05:40:45 +00:00
Steve Langasek
1e963007c0 debian/patches/0001-Update-openssl-to-0.9.8za.patch: cherry-pick
openssl 0.9.8za in via upstream.
2014-10-07 05:35:11 +00:00
Steve Langasek
e34fca619d Drop prototypes patch, apparently not needed upstream 2014-10-07 00:30:44 +00:00
Steve Langasek
c61b06bc69 drop most patches, included upstream. 2014-10-07 00:30:39 +00:00
Steve Langasek
59945b252e Merge upstream version 0.7 2014-10-06 17:17:33 -07:00
Steve Langasek
72bb39c023 Import upstream version 0.7 2014-10-06 15:39:48 -07:00
Peter Jones
159609ee4e Correctly reject bad tftp addresses earlier, rather than later.
This check is for end == NULL but was meant to be *end == '\0'.  Without
this change, we'll pass a plausibly bad address (i.e. one with no ']' at
the end) to Mtftp(... READ_FILE ...), which should fail correctly, but
our error messaging will be inconsistent.

Signed-off-by: Peter Jones <pjones@redhat.com>
2014-10-02 01:01:54 -04:00
Peter Jones
c0949c0a79 Correctly reject bad tftp addresses earlier, rather than later.
This check is for end == NULL but was meant to be *end == '\0'.  Without
this change, we'll pass a plausibly bad address (i.e. one with no ']' at
the end) to Mtftp(... READ_FILE ...), which should fail correctly, but
our error messaging will be inconsistent.

Signed-off-by: Peter Jones <pjones@redhat.com>
2014-10-02 01:01:54 -04:00
Peter Jones
7d953d6722 Use -Werror=sign-compare .
I'm going to have to fix any errors that have this anyway, so may as
well do it here properly.

Signed-off-by: Peter Jones <pjones@redhat.com>
2014-10-02 01:01:54 -04:00
Peter Jones
6a115d038a Use -Werror=sign-compare .
I'm going to have to fix any errors that have this anyway, so may as
well do it here properly.

Signed-off-by: Peter Jones <pjones@redhat.com>
2014-10-02 01:01:54 -04:00
Peter Jones
a6dfd3e426 Make another integer compare be signed/unsigned safe as well.
Signed-off-by: Peter Jones <pjones@redhat.com>
2014-10-02 01:01:54 -04:00
Peter Jones
c622b677d6 Make another integer compare be signed/unsigned safe as well.
Signed-off-by: Peter Jones <pjones@redhat.com>
2014-10-02 01:01:54 -04:00
Sebastian Krahmer
0dbc0e7f42 OOB access when parsing MOK List/Certificates on MOK enrollment 2014-10-02 01:01:54 -04:00
Sebastian Krahmer
034466b773 OOB access when parsing MOK List/Certificates on MOK enrollment 2014-10-02 01:01:54 -04:00
Sebastian Krahmer
f6bff34f51 shim buffer overflow on ipv6 option parsing 2014-10-02 01:01:54 -04:00
Sebastian Krahmer
e253c2a2c0 shim buffer overflow on ipv6 option parsing 2014-10-02 01:01:54 -04:00
Peter Jones
597dd8393b Another testplan error.
Signed-off-by: Peter Jones <pjones@redhat.com>
2014-10-02 01:01:46 -04:00
Peter Jones
a2e66ece4d Another testplan error.
Signed-off-by: Peter Jones <pjones@redhat.com>
2014-10-02 01:01:46 -04:00
Gary Ching-Pang Lin
e83cd86c67 Cryptlib: remove the unused files
I mistakenly added CryptPkcs7VerifyNull.c which may make Pkcs7Verify
always return FALSE. Besides CryptPkcs7VerifyNull.c, there are some
functions we would never use. This commit removes those files to
avoid any potential trouble.

Signed-off-by: Gary Ching-Pang Lin <glin@suse.com>
2014-10-02 00:10:47 -04:00
Gary Ching-Pang Lin
663a5ca59d Cryptlib: remove the unused files
I mistakenly added CryptPkcs7VerifyNull.c which may make Pkcs7Verify
always return FALSE. Besides CryptPkcs7VerifyNull.c, there are some
functions we would never use. This commit removes those files to
avoid any potential trouble.

Signed-off-by: Gary Ching-Pang Lin <glin@suse.com>
2014-10-02 00:10:47 -04:00
Gary Ching-Pang Lin
f852734c5a Don't verify images with the empty build key
We replaced the build key with an empty file while compiling shim
for our distro. Skip the verification with the empty build key
since this makes no sense.

Signed-off-by: Gary Ching-Pang Lin <glin@suse.com>
2014-10-02 00:08:50 -04:00
Gary Ching-Pang Lin
db43ba5a5f Don't verify images with the empty build key
We replaced the build key with an empty file while compiling shim
for our distro. Skip the verification with the empty build key
since this makes no sense.

Signed-off-by: Gary Ching-Pang Lin <glin@suse.com>
2014-10-02 00:08:50 -04:00
Peter Jones
e258243e43 Fix some minor testplan errors.
Signed-off-by: Peter Jones <pjones@redhat.com>
2014-10-02 00:02:43 -04:00
Peter Jones
aa818fe639 Fix some minor testplan errors.
Signed-off-by: Peter Jones <pjones@redhat.com>
2014-10-02 00:02:43 -04:00
Peter Jones
ada75ade4c Don't append an empty cert list to MokListRT if vendor_cert_size is 0.
Signed-off-by: Peter Jones <pjones@redhat.com>
2014-10-02 00:02:43 -04:00
Peter Jones
f14119502e Don't append an empty cert list to MokListRT if vendor_cert_size is 0.
Signed-off-by: Peter Jones <pjones@redhat.com>
2014-10-02 00:02:43 -04:00
Peter Jones
a16340e3f7 Actually find the relocations correctly and process them that way.
Find the relocations based on the *file* address in the old binary,
because it's only the same as the virtual address some of the time.

Also perform some extra validation before processing it, and don't bail
out in /error/ if both ReloceBase and RelocEnd are null - that condition
is fine.

Signed-off-by: Peter Jones <pjones@redhat.com>
2014-09-30 22:51:32 -04:00
Peter Jones
a846aedd0e Actually find the relocations correctly and process them that way.
Find the relocations based on the *file* address in the old binary,
because it's only the same as the virtual address some of the time.

Also perform some extra validation before processing it, and don't bail
out in /error/ if both ReloceBase and RelocEnd are null - that condition
is fine.

Signed-off-by: Peter Jones <pjones@redhat.com>
2014-09-30 22:51:32 -04:00
Peter Jones
05b61752db Revert header changes
Revert "Do the same for ia32..."
and "Generate a sane PE header on shim, fallback, and MokManager."
This reverts commit 6744a7ef8e.
and commit 0e7ba5947e.

These are premature and I can do this without such drastic measures.

Signed-off-by: Peter Jones <pjones@redhat.com>
2014-09-30 22:49:21 -04:00