<feed xmlns='http://www.w3.org/2005/Atom'>
<title>efi-boot-shim.git, branch 15.6</title>
<subtitle> (mirror of https://github.com/vyos/efi-boot-shim.git)
</subtitle>
<id>https://git.amelek.net/vyos/efi-boot-shim.git/atom?h=15.6</id>
<link rel='self' href='https://git.amelek.net/vyos/efi-boot-shim.git/atom?h=15.6'/>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/efi-boot-shim.git/'/>
<updated>2022-06-01T18:25:48+00:00</updated>
<entry>
<title>bump version to shim-15.6</title>
<updated>2022-06-01T18:25:48+00:00</updated>
<author>
<name>Peter Jones</name>
<email>pjones@redhat.com</email>
</author>
<published>2022-06-01T18:25:48+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/efi-boot-shim.git/commit/?id=505cdb678b319fcf9a7fdee77c0f091b4147cbe5'/>
<id>urn:sha1:505cdb678b319fcf9a7fdee77c0f091b4147cbe5</id>
<content type='text'>
Signed-off-by: Peter Jones &lt;pjones@redhat.com&gt;
</content>
</entry>
<entry>
<title>sbat: add the parsed SBAT variable entries to the debug log</title>
<updated>2022-06-01T15:01:24+00:00</updated>
<author>
<name>Peter Jones</name>
<email>pjones@redhat.com</email>
</author>
<published>2022-06-01T15:01:24+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/efi-boot-shim.git/commit/?id=a674edede0b3322b7e1d4f38dc03ec5bce9d81f5'/>
<id>urn:sha1:a674edede0b3322b7e1d4f38dc03ec5bce9d81f5</id>
<content type='text'>
Signed-off-by: Peter Jones &lt;pjones@redhat.com&gt;
</content>
</entry>
<entry>
<title>shim-15.6~rc2</title>
<updated>2022-05-31T19:17:14+00:00</updated>
<author>
<name>Peter Jones</name>
<email>pjones@redhat.com</email>
</author>
<published>2022-05-31T19:17:14+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/efi-boot-shim.git/commit/?id=8ee1e1c132dfacf21dbc460be629fdb17e2304c2'/>
<id>urn:sha1:8ee1e1c132dfacf21dbc460be629fdb17e2304c2</id>
<content type='text'>
Signed-off-by: Peter Jones &lt;pjones@redhat.com&gt;
</content>
</entry>
<entry>
<title>Also avoid CVE-2022-28737 in verify_image()</title>
<updated>2022-05-24T20:28:35+00:00</updated>
<author>
<name>Peter Jones</name>
<email>pjones@redhat.com</email>
</author>
<published>2022-05-03T21:05:20+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/efi-boot-shim.git/commit/?id=159151b6649008793d6204a34d7b9c41221fb4b0'/>
<id>urn:sha1:159151b6649008793d6204a34d7b9c41221fb4b0</id>
<content type='text'>
PR 446 ("Add verify_image") duplicates some of the code affected by
Chris Coulson's defense in depth patch against CVE-2022-28737 ("pe:
Perform image verification earlier when loading grub").

This patch makes the same change to the new function.

Signed-off-by: Peter Jones &lt;pjones@redhat.com&gt;
</content>
</entry>
<entry>
<title>Update SBAT generation requirements for 05/24/22</title>
<updated>2022-05-24T20:28:35+00:00</updated>
<author>
<name>Jan Setje-Eilers</name>
<email>jan.setjeeilers@oracle.com</email>
</author>
<published>2022-05-10T21:09:26+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/efi-boot-shim.git/commit/?id=9a09faf390eea083c3bef1b07c7e043ebe0cc1f6'/>
<id>urn:sha1:9a09faf390eea083c3bef1b07c7e043ebe0cc1f6</id>
<content type='text'>
bump shim SBAT generation requirement to 2 for CVE-2022-28737
bump GRUB2 SBAT generation requirement to 2 for CVE-2021-3695

Signed-off-by: Jan Setje-Eilers &lt;jan.setjeeilers@oracle.com&gt;
</content>
</entry>
<entry>
<title>Update advertised sbat generation number for shim</title>
<updated>2022-05-24T20:28:35+00:00</updated>
<author>
<name>Jan Setje-Eilers</name>
<email>jan.setjeeilers@oracle.com</email>
</author>
<published>2022-05-10T20:14:24+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/efi-boot-shim.git/commit/?id=80e34fc3d55106680a245f6338bec627114bed35'/>
<id>urn:sha1:80e34fc3d55106680a245f6338bec627114bed35</id>
<content type='text'>
Signed-off-by: Jan Setje-Eilers &lt;jan.setjeeilers@oracle.com&gt;
</content>
</entry>
<entry>
<title>pe: Perform image verification earlier when loading grub</title>
<updated>2022-05-24T20:28:35+00:00</updated>
<author>
<name>Chris Coulson</name>
<email>chris.coulson@canonical.com</email>
</author>
<published>2022-05-03T14:02:19+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/efi-boot-shim.git/commit/?id=5a82d7973656c68f006aac1ed462e7bb37075d92'/>
<id>urn:sha1:5a82d7973656c68f006aac1ed462e7bb37075d92</id>
<content type='text'>
The second stage loader was being verified after loading it into
memory. As an additional hardening measure to avoid performing risky
memcpys using header fields from a potentially specially crafted image,
perform the verification before this so that it can be rejected earlier.

Signed-off-by: Chris Coulson &lt;chris.coulson@canonical.com&gt;
</content>
</entry>
<entry>
<title>pe: Fix a buffer overflow when SizeOfRawData &gt; VirtualSize</title>
<updated>2022-05-24T20:28:35+00:00</updated>
<author>
<name>Chris Coulson</name>
<email>chris.coulson@canonical.com</email>
</author>
<published>2022-05-03T13:41:00+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/efi-boot-shim.git/commit/?id=e99bdbb827a50cde019393d3ca1e89397db221a7'/>
<id>urn:sha1:e99bdbb827a50cde019393d3ca1e89397db221a7</id>
<content type='text'>
During image loading, the size of the destination buffer for the image
is determined by the SizeOfImage field in the optional header. The start
and end virtual addresses of each section, as determined by each section's
VirtualAddress and VirtualSize fields, are bounds checked against the
allocated buffer. However, the amount of data copied to the destination
buffer is determined by the section's SizeOfRawData filed. If this is
larger than the VirtualSize, then the copy can overflow the destination
buffer.

Fix this by limiting the amount of data to copy to the section's
VirtualSize. In the case where a section has SizeOfRawData &gt; VirtualSize,
the excess data is discarded.

This fixes CVE-2022-28737

Signed-off-by: Chris Coulson &lt;chris.coulson@canonical.com&gt;
</content>
</entry>
<entry>
<title>SBAT Policy latest should be a one-shot</title>
<updated>2022-05-24T20:27:48+00:00</updated>
<author>
<name>Jan Setje-Eilers</name>
<email>jan.setjeeilers@oracle.com</email>
</author>
<published>2022-05-24T18:49:44+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/efi-boot-shim.git/commit/?id=77144e5a404df89b45941bfc54fd2f59e0ee607b'/>
<id>urn:sha1:77144e5a404df89b45941bfc54fd2f59e0ee607b</id>
<content type='text'>
Since booting from removable media can be hard to detect,
setting a persistent latest SBAT policy is risky in a typical
client system. This changes latest to be a one-shot operation
that could be set at the time of an OS update if desired.

Signed-off-by: Jan Setje-Eilers &lt;Jan.SetjeEilers@oracle.com&gt;
</content>
</entry>
<entry>
<title>shim-15.6~rc1</title>
<updated>2022-05-24T20:09:39+00:00</updated>
<author>
<name>Peter Jones</name>
<email>pjones@redhat.com</email>
</author>
<published>2022-05-23T20:52:37+00:00</published>
<link rel='alternate' type='text/html' href='https://git.amelek.net/vyos/efi-boot-shim.git/commit/?id=c0bcd04f5abe9d6efe04e7d8727fa4afe4d46eff'/>
<id>urn:sha1:c0bcd04f5abe9d6efe04e7d8727fa4afe4d46eff</id>
<content type='text'>
</content>
</entry>
</feed>
