[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [SECURITY PATCH 00/13] Multiple GRUB2 vulnerabilities - 2022/11/15
From: |
Daniel Kiper |
Subject: |
Re: [SECURITY PATCH 00/13] Multiple GRUB2 vulnerabilities - 2022/11/15 |
Date: |
Wed, 16 Nov 2022 18:44:10 +0100 |
On Tue, Nov 15, 2022 at 07:00:20PM +0100, Daniel Kiper wrote:
> Hi all,
>
> This patch set contains a bundle of fixes for various security flaws
> discovered
> in the GRUB2 font code during last few months. The most severe ones, i.e.
> potentially
> exploitable, have CVEs assigned and are listed at the end of this email.
>
> Details of exactly what needs updating will be provided by the respective
> distros and vendors when updates become available. Here [1] we are listing at
> least some links to the messaging known at the time of this posting.
>
> Full mitigation against all CVEs will require updated shim with latest SBAT
> (Secure Boot Advanced Targeting) [2] data provided by distros and vendors.
> This time UEFI revocation list (dbx) will not be used and revocation of broken
> artifacts will be done with SBAT only. For information on how to apply the
> latest SBAT revocations, please see mokutil(1). Vendor shims may explicitly
> permit known older boot artifacts to boot.
>
> Updated GRUB2, shim and other boot artifacts from all the affected vendors
> will
> be made available when the embargo lifts or some time thereafter.
>
> I am posting all the GRUB2 upstream patches which fix all security bugs found
> and reported up until now. Major Linux distros carry or will carry soon one
> form or another of these patches. Now all the GRUB2 upstream patches are in
> the GRUB2 git repository [3] too.
>
> I would like to thank, in alphabetical order, the following people who were
> working
> really hard on the GRUB, shim and other things related to these issues:
> - Alexander Burmashev (Oracle),
> - Chris Coulson (Canonical),
> - D. Jared Dominguez (Red Hat),
> - Daniel Axtens,
> - Eric Snowberg (Oracle),
> - Ilya Okomin (Oracle),
> - Jan Setje-Eilers (Oracle),
> - Julian Andres Klode (Canonical),
> - Marco A Benatto (Red Hat),
> - Marta Lewandowska (Red Hat),
> - Peter Jones (Red Hat),
> - Robbie Harwood (Red Hat),
> - Steve McIntyre (Debian),
> - Zhang Boyang.
I was told Petr Janda (Red Hat) should be added to this list. Sorry
about that. This was not intentional omission.
Daniel
- [SECURITY PATCH 10/13] font: Fix an integer underflow in blit_comb(), (continued)
- [SECURITY PATCH 10/13] font: Fix an integer underflow in blit_comb(), Daniel Kiper, 2022/11/15
- [SECURITY PATCH 05/13] font: Fix integer overflow in ensure_comb_space(), Daniel Kiper, 2022/11/15
- [SECURITY PATCH 07/13] font: Fix integer underflow in binary search of char index, Daniel Kiper, 2022/11/15
- [SECURITY PATCH 08/13] kern/efi/sb: Enforce verification of font files, Daniel Kiper, 2022/11/15
- [SECURITY PATCH 09/13] fbutil: Fix integer overflow, Daniel Kiper, 2022/11/15
- [SECURITY PATCH 11/13] font: Harden grub_font_blit_glyph() and grub_font_blit_glyph_mirror(), Daniel Kiper, 2022/11/15
- [SECURITY PATCH 12/13] font: Assign null_font to glyphs in ascii_font_glyph[], Daniel Kiper, 2022/11/15
- [SECURITY PATCH 06/13] font: Fix integer overflow in BMP index, Daniel Kiper, 2022/11/15
- [SECURITY PATCH 13/13] normal/charset: Fix an integer overflow in grub_unicode_aglomerate_comb(), Daniel Kiper, 2022/11/15
- Re: [SECURITY PATCH 00/13] Multiple GRUB2 vulnerabilities - 2022/11/15, Daniel Kiper, 2022/11/15
- Re: [SECURITY PATCH 00/13] Multiple GRUB2 vulnerabilities - 2022/11/15,
Daniel Kiper <=