-
Notifications
You must be signed in to change notification settings - Fork 131
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Shim 15.8 for FortiOS #356
Comments
I'm not an authorized reviewer, but I'd like to contribute and help Build reproducibility
Shim source
Certificates
SBAT
GRUBCouldn't find sources and/or patches for GRUB2 NOT OK As stated in README.md:
KernelAs with GRUB2, can't verify. As stated in README.md:
|
I'll send verification emails first, and once the verification is successful, I'll then proceed with the application. |
Verification emails sent. |
exhalations adolescence Tartars casters traded spacesuits hubbies |
contradicts shrubberies accusing Minnie flask molding hasted kenning |
Reviewing.
I myself can't verify, what local kernel patches have been added, as well as how the I don't know, what the committee or Microsoft are to say about this. If it must be verified, I'd need access to the product and/or its sources, to see if some proof-of-concept exploits work with the kernel shipped, and once they don't, then I could provide a more detailed answer, that the ports are indeed fine. A similar scenario is about GRUB2 - I can only check the upstream gnu.org grub-2.06 sources snapshot or the upstream development process at savannah.gnu.org, but not the manual porting process. I don't suppose I could request a demo by contacting the sales department and explaining, that it's needed to make this review complete. ;-) |
grub and kernel lockdown patches are in Please let me know if you need more information. |
Thank you for the patches! Here is my analysis of the GRUB2 patches. cve-2023-10.patch:
cve-2022-11.patch:
cve-2022-06.patch:
I can see the code related to the SECURITY PATCH 23/30 (just 4 lines changed) has not been incorporated. Was this done on purpose? Or am I'm overanalyzing it, as you ship a version, which mitigates CVE-2022-28734 without these changes? (Info: skipping mentions of CVE-2022-28737, as it was a shim vulnerability) The kernel-related patch seems to have these lockdown-related fixes applied, just like the description in its comment says, and I assume that the security team has internally tested that proof-of-concept exploits like this one do not work. The patch in its uploaded form won't work for me, as I don't have access to the complete sources, so I won't be able to compile a kernel with options like Maybe in this case I'll ask more experienced reviewers, what's the best thing to do here. |
You are right, we missed SECURITY PATCH 23/30, will add it, or if we use grub-2.12, will it meet all requirements of shim-review? For kernel, our kernel maybe difficult to test with normal script like |
I myself understand that question in the application template as making sure the GRUB2 release shipped in one's bootchain is not vulnerable to certain CVEs, security patches being one way to mitigate issues (there's a similar question regarding kernel patches, where the RHEL-based releases do not apply one patch, but use a config, which mitigates the issue). So the version should not matter, as long as the artifacts being loaded are not vulnerable. Similarly, an SBAT generation number may be bumped along with porting the appropriate patches to the current product version or by updating to a newer version, which is not vulnerable. I can take a closer look at the kernel patch to confirm, that it implements the related code correctly and myself could assume that no issues are present in the final artifact that's being loaded. But I don't know if Microsoft could share that assumption with me, and, after all, they sign the shim binary. |
Hi, is there any update on kernel patch review? |
Hello.
Yes! Simply update the appropriate entries and I'll re-review them ASAP.
I'm still worried that I might miss something and don't want to be held accountable for some issues that I won't be able to find. Sorry - not yet. I think the best bet is to try and ping someone else who has more experience with the kernel than me. |
Hello, Could your please review? |
LGTM! Let's wait for another official review and let me wish you all the best! Some loose notes from the reviewing part: Kind of a nitpick, but the SHA256 listings mention the GRUB2 updated to upstream 2.12 - OK. At last, I did review the current kernel patch and it (the patch - I don't have access to the complete sources) seems alright. Notes to myself:
|
Just a moment after posting this comment I had a revelation: please update the initial post and the issue's title to reflect the current status, i.e. shim 15.8, the current git tag and the current checksums. |
Review of Shim 15.8 for FortiOS: fortinet-shim-x86_64_aarch64-20240208OK
Issues / queries
Excellent submission, and thanks to @Blarse for reviewing too 👍 Marking as accepted |
Great, thank you all for the review! |
@fgtvm did you get a signed shim back? |
closing as there hasn't been any response for a month |
Confirm the following are included in your repo, checking each box:
What is the link to your tag in a repo cloned from rhboot/shim-review?
https://github.com/fortinet/shim-review/tree/fortinet-shim-x86_64_aarch64-20240208
What is the SHA256 hash of your final SHIM binary?
eb7f324221e23f94fa92193c495b35ed4bde274aab9c0f761ec9c0c37c9f90b0 shimx64.efi 0d25eecddf7306bff58f9739194bccca0a94d4f7bd7cb5d6097228a9fe4caf60 shimaa64.efi
What is the link to your previous shim review request (if any, otherwise N/A)?
N/A
The text was updated successfully, but these errors were encountered: