Commit Graph

418 Commits

Author SHA1 Message Date
Mathieu Trudel-Lapierre
9fa1d28f0d debian/copyright: update copyright for patches. 2016-07-26 16:48:29 -04:00
Mathieu Trudel-Lapierre
7fbc200d47 * debian/patches/unused-variable: remove unused variable size.
* debian/patches/binutils-version-matching: revert d9a4c912 to correctly
  match objcopy's version on Ubuntu.
2016-07-26 14:37:29 -04:00
Mathieu Trudel-Lapierre
d191cf2c9e Update bug tags for closed bugs upstream. 2016-07-26 13:48:37 -04:00
Mathieu Trudel-Lapierre
beb4623938 Apply patches again 2016-07-26 13:31:49 -04:00
Mathieu Trudel-Lapierre
110c669fd6 * Refreshed patches.
- Remaining patches:
    + second-stage-path
    + sbsigntool-not-pesign
2016-07-26 12:20:13 -04:00
Mathieu Trudel-Lapierre
1854cb28d1 New upstream release. 2016-07-26 12:03:25 -04:00
Mathieu Trudel-Lapierre
d3819813b8 Import upstream version 0.9+1465500757.14a5905 2016-07-26 12:02:18 -04:00
Mathieu Trudel-Lapierre
c2f285a93f More GCC 5 fixes: stdarg.h and other include tweaks, cherry-pick from
d51739a4.
2015-05-12 21:51:24 -04:00
Mathieu Trudel-Lapierre
d6f876b850 Fix build with GCC 5, forcing -std=gnu89 to not rely on stdint.h
required by efibind.h, and not found with -nostdinc. (LP: #1429978)
2015-05-12 21:48:09 -04:00
Steve Langasek
8fa98d6dcd releasing package shim version 0.8-0ubuntu2 2015-05-12 17:48:34 +00:00
Mathieu Trudel-Lapierre
acd2cc1e4f * New upstream release.
- Clarify meaning of insecure_mode. (LP: #1384973)
* debian/patches/CVE-2014-3675.patch, debian/patches/CVE-2014-3677.patch,
  debian/patches/0001-Update-openssl-to-0.9.8za.patch: dropped, included
  in the upstream release.
* debian/patches/sbsigntool-not-pesign,debian/patches/second-stage-path:
  refreshed.
2015-05-11 19:50:49 -04:00
Mathieu Trudel-Lapierre
86a08c30b4 Reapplying all patches 2015-05-10 10:03:20 -04:00
Mathieu Trudel-Lapierre
37358ddb1c Add bug tag for insecure_mode semantics changes in 0.8. 2015-05-07 16:03:19 -04:00
Mathieu Trudel-Lapierre
28da53af72 debian/patches/sbsigntool-not-pesign,debian/patches/second-stage-path:
refreshed.
2015-05-06 14:02:40 -04:00
Mathieu Trudel-Lapierre
e42efbd92b debian/patches/CVE-2014-3675.patch, debian/patches/CVE-2014-3677.patch,
debian/patches/0001-Update-openssl-to-0.9.8za.patch: dropped, included
in the upstream release.
2015-05-06 14:01:16 -04:00
Mathieu Trudel-Lapierre
4c03444e7c New upstream release. 2015-05-06 09:50:11 -04:00
Mathieu Trudel-Lapierre
a14921c594 Import upstream version 0.8 2015-05-06 09:49:41 -04:00
Mathieu Trudel-Lapierre
2283f5e85d Unapplying patches to prevent spurious conflicts. 2015-05-06 09:49:30 -04:00
Steve Langasek
3967dc6524 Merge upstream git branch for release 0.7 2015-05-05 23:32:33 +00:00
Steve Langasek
8b0389dd27 Fix the version number; this was uploaded for some reason as -0ubuntu4, not -0ubuntu3. 2015-05-05 08:59:32 -07:00
Peter Jones
7361f67dbd Bump version to 0.8 2014-10-13 16:41:51 -04:00
Steve Langasek
e82e770609 releasing package shim version 0.7-0ubuntu3 2014-10-08 06:41:01 +00:00
Steve Langasek
3586772f0c * SECURITY UPDATE: heap overflow and out-of-bounds read access when
parsing DHCPv6 information
  - debian/patches/CVE-2014-3675.patch: apply proper bounds checking
    when parsing data provided in DHCPv6 packets.
  - CVE-2014-3675
  - CVE-2014-3676
* SECURITY UPDATE: memory corruption when processing user-provided key
  lists
  - debian/patches/CVE-2014-3677.patch: detect malformed machine owner
    key (MOK) lists and ignore them, avoiding possible memory corruption.
  - CVE-2014-3677
2014-10-08 06:40:28 +00:00
Steve Langasek
bc9b5d6386 releasing package shim version 0.7-0ubuntu2 2014-10-07 16:20:10 -07:00
Steve Langasek
4960f3580e Update debian/patches/prototypes with some new declarations needed for
openssl 0.9.8za update.
2014-10-07 16:20:02 -07:00
Steve Langasek
172647da18 Restore debian/patches/prototypes, which still is needed on shim 0.7
but only detected on the buildds.
2014-10-07 09:40:06 -07:00
Steve Langasek
db8383ad9f releasing package shim version 0.7-0ubuntu1 2014-10-07 05:40:45 +00:00
Steve Langasek
1e963007c0 debian/patches/0001-Update-openssl-to-0.9.8za.patch: cherry-pick
openssl 0.9.8za in via upstream.
2014-10-07 05:35:11 +00:00
Steve Langasek
e34fca619d Drop prototypes patch, apparently not needed upstream 2014-10-07 00:30:44 +00:00
Steve Langasek
c61b06bc69 drop most patches, included upstream. 2014-10-07 00:30:39 +00:00
Steve Langasek
59945b252e Merge upstream version 0.7 2014-10-06 17:17:33 -07:00
Steve Langasek
72bb39c023 Import upstream version 0.7 2014-10-06 15:39:48 -07:00
Peter Jones
159609ee4e Correctly reject bad tftp addresses earlier, rather than later.
This check is for end == NULL but was meant to be *end == '\0'.  Without
this change, we'll pass a plausibly bad address (i.e. one with no ']' at
the end) to Mtftp(... READ_FILE ...), which should fail correctly, but
our error messaging will be inconsistent.

Signed-off-by: Peter Jones <pjones@redhat.com>
2014-10-02 01:01:54 -04:00
Peter Jones
7d953d6722 Use -Werror=sign-compare .
I'm going to have to fix any errors that have this anyway, so may as
well do it here properly.

Signed-off-by: Peter Jones <pjones@redhat.com>
2014-10-02 01:01:54 -04:00
Peter Jones
a6dfd3e426 Make another integer compare be signed/unsigned safe as well.
Signed-off-by: Peter Jones <pjones@redhat.com>
2014-10-02 01:01:54 -04:00
Sebastian Krahmer
0dbc0e7f42 OOB access when parsing MOK List/Certificates on MOK enrollment 2014-10-02 01:01:54 -04:00
Sebastian Krahmer
f6bff34f51 shim buffer overflow on ipv6 option parsing 2014-10-02 01:01:54 -04:00
Peter Jones
597dd8393b Another testplan error.
Signed-off-by: Peter Jones <pjones@redhat.com>
2014-10-02 01:01:46 -04:00
Gary Ching-Pang Lin
e83cd86c67 Cryptlib: remove the unused files
I mistakenly added CryptPkcs7VerifyNull.c which may make Pkcs7Verify
always return FALSE. Besides CryptPkcs7VerifyNull.c, there are some
functions we would never use. This commit removes those files to
avoid any potential trouble.

Signed-off-by: Gary Ching-Pang Lin <glin@suse.com>
2014-10-02 00:10:47 -04:00
Gary Ching-Pang Lin
f852734c5a Don't verify images with the empty build key
We replaced the build key with an empty file while compiling shim
for our distro. Skip the verification with the empty build key
since this makes no sense.

Signed-off-by: Gary Ching-Pang Lin <glin@suse.com>
2014-10-02 00:08:50 -04:00
Peter Jones
e258243e43 Fix some minor testplan errors.
Signed-off-by: Peter Jones <pjones@redhat.com>
2014-10-02 00:02:43 -04:00
Peter Jones
ada75ade4c Don't append an empty cert list to MokListRT if vendor_cert_size is 0.
Signed-off-by: Peter Jones <pjones@redhat.com>
2014-10-02 00:02:43 -04:00
Peter Jones
a16340e3f7 Actually find the relocations correctly and process them that way.
Find the relocations based on the *file* address in the old binary,
because it's only the same as the virtual address some of the time.

Also perform some extra validation before processing it, and don't bail
out in /error/ if both ReloceBase and RelocEnd are null - that condition
is fine.

Signed-off-by: Peter Jones <pjones@redhat.com>
2014-09-30 22:51:32 -04:00
Peter Jones
05b61752db Revert header changes
Revert "Do the same for ia32..."
and "Generate a sane PE header on shim, fallback, and MokManager."
This reverts commit 6744a7ef8e.
and commit 0e7ba5947e.

These are premature and I can do this without such drastic measures.

Signed-off-by: Peter Jones <pjones@redhat.com>
2014-09-30 22:49:21 -04:00
Peter Jones
9ac3f69597 Make list_keys() index variables all be signed.
We build with -Werror=signed-compare in fedora/rhel rpms, and this
showed up.

Signed-off-by: Peter Jones <pjones@redhat.com>
2014-09-21 16:25:28 -04:00
Peter Jones
f9d825b242 Do the same for ia32...
Once again, on ia32 this time, we see:

00000120  47 84 00 00 0a 00 00 00  00 00 00 00 00 00 00 00 |G...............|

Which is where the pointer on ia32 for the Base Relocation Table should
be.  It points to 0x8447, which isn't a particularly reasonable address as
numbers go, and happens to have this data there:

00008440  6f 00 6e 00 66 00 69 00  67 00 75 00 72 00 65 00 |o.n.f.i.g.u.r.e.|
00008450  00 00 49 00 50 00 76 00  36 00 28 00 00 00 2c 00 |..I.P.v.6.(...,.|
00008460  25 00 73 00 2c 00 00 00  29 00 00 00 25 00 64 00 |%.s.,...)...%.d.|
00008470  2e 00 25 00 64 00 2e 00  25 00 64 00 2e 00 25 00 |..%.d...%.d...%.|
00008480  64 00 00 00 44 00 48 00  43 00 50 00 00 00 49 00 |d...D.H.C.P...I.|
00008490  50 00 76 00 34 00 28 00  00 00 2c 00 25 00 73 00 |P.v.4.(...,.%.s.|

And so that table is, in theory, this part:

00008447                       00  67 00 75 00 72 00 65 00 |       .g.u.r.e.|
00008450  00                                               |.               |

Which is pretty clearly not a pointer table of any kind.

So give ia32 the same treatment as x86_64, and now all arches work basically
the same.

Signed-off-by: Peter Jones <pjones@redhat.com>
2014-09-21 16:25:27 -04:00
Peter Jones
2c59a1a03a Generate a sane PE header on shim, fallback, and MokManager.
It turns out a7249a65 was masking a second problem - on some binaries,
when we actually don't have any base relocations at all, binutils'
"objcopy --target efi-app-x86_64" is generating a PE header with a base
relocations pointer that happily points into the middle of our text
section.  So with shim processing base relocations correctly, it refuses
to load those binaries.

For example, on one binary I just built:

00000130  00 a0 00 00 0a 00 00 00  00 00 00 00 00 00 00 00 |................|

which says there's a Base Relocation Table at 0xa000 that's 0xa bytes long.
That's here:

0000a000  58 00 29 00 00 00 00 00  48 00 44 00 28 00 50 00 |X.).....H.D.(.P.|
0000a010  61 00 72 00 74 00 25 00  64 00 2c 00 53 00 69 00 |a.r.t.%.d.,.S.i.|
0000a020  67 00 25 00 67 00 29 00  00 00 00 00 00 00 00 00 |g.%.g.).........|
0000a030  48 00 44 00 28 00 50 00  61 00 72 00 74 00 25 00 |H.D.(.P.a.r.t.%.|

So the table is:

0000a000  58 00 29 00 00 00 00 00  48 00                   |X.).....H.      |

That wouldn't be so bad, except those binaries are MokManager.efi,
fallback.efi, and shim.efi, and sometimes they're .reloc, which we're
actually trying to handle correctly now because grub builds with a real
and valid .reloc table.  So though I didn't think there was any hair
left on this yak, more shaving ensues.

With this change, instead of letting objcopy do whatever it likes, we
switch to "-O binary" and merely link in a header that's appropriate for
our binaries.  This is the same method Ard wrote for aarch64, and it
seems to work fine in either place (modulo some minor changes.)

At some point this should be merged into gnu-efi instead of carrying our
own crt0-efi-x86_64.S, but that's a less immediate problem.

I did not need this problem.

Signed-off-by: Peter Jones <pjones@redhat.com>
2014-09-21 16:25:27 -04:00
Peter Jones
631225fb33 Fix our "in_protocol" printing.
When I merged 4bfb13d and fixed the conflicts, I managed to make the
in_protocol test exactly backwards, so that's why we don't currently see
error messages.

Signed-off-by: Peter Jones <pjones@redhat.com>
2014-09-21 16:25:27 -04:00
Peter Jones
213e29e25b Don't call AuthenticodeVerify if vendor_cert_size is 0.
Actually check the size of our vendor cert quite early, so that there's
no confusion as to what's going on.

This isn't strictly necessary, in that in all cases if vendor_cert_size
is 0, then AuthenticodeVerify -> Pkcs7Verify() -> d2i_X509() will result
in a NULL "Cert", and it will return FALSE, and we'll reject the
signature, but better to avoid all that code in the first place.  Belt
and suspenders and whatnot.

Based on a patch from https://github.com/TBOpen .

Signed-off-by: Peter Jones <pjones@redhat.com>
2014-09-21 16:25:27 -04:00
Peter Jones
0dcd5a8e90 Validate computed hash bases/hash sizes more thoroughly.
I screwed one of these up when working on 750584c, and it's a real pain
to figure out, so that means we should be validating them.

Signed-off-by: Peter Jones <pjones@redhat.com>
2014-09-21 16:25:20 -04:00