Hírolvasó
Just about every Windows and Linux device vulnerable to new LogoFAIL firmware attack (ars technica)
As its name suggests, LogoFAIL involves logos, specifically those of the hardware seller that are displayed on the device screen early in the boot process, while the UEFI is still running. Image parsers in UEFIs from all three major IBVs [independent BIOS vendors] are riddled with roughly a dozen critical vulnerabilities that have gone unnoticed until now. By replacing the legitimate logo images with identical-looking ones that have been specially crafted to exploit these bugs, LogoFAIL makes it possible to execute malicious code at the most sensitive stage of the boot process.
Security updates for Thursday
Titkosítva menti a fotókat a Proton Drive
Egy rekordot már biztosan megdöntött a Rockstarnál a GTA VI
Jön a Google eddigi legfejlettebb MI-modellje
Megúszhatja az iMessage a szigorúbb uniós szabályozást
Bekapcsolta a Meta a Messenger erős titkosítását
Megjött a VoWiFi a Yettel lakossági ügyfeleinek
Pete Zaitcev: RHEL 9 on libvirt and KVM
Problem: you create and VM like you always did, but RHEL 9 bombs with:
Fatal glibc error: CPU does not support x86-64-v2Solution: as Dan Berrange explains in bug #2060839, a traditional default CPU model qemu64 is no longer sufficient. Unfortunately, there's no "qemu64-v2". Instead, you must select one of the real CPUs.
<cpu mode='host-model' match='exact' check='none'><model fallback='forbid'>Broadwell-v4</model>
</cpu>
[$] LWN.net Weekly Edition for December 7, 2023
[$] A schism in the OpenPGP world
Gustavo A. R. Silva: Influencing Software Security: The Impact of the Kernel Self-Protection Project ⚔️🛡️🐧
On November 29th, the Open Source Security Foundation (OpenSSF) released a comprehensive and thorough hardening guide aimed at mitigating potential vulnerabilities in C and C++ code through the use of various hardening compiler options.
- Strengthening the Fort : OpenSSF Releases Compiler Options Hardening Guide for C and C++ (blog post about the guide)
- Compiler Options Hardening Guide for C and C++ (the guide)
This guide references some of the work we’ve accomplished over the years in the Kernel Self-Protection Project (KSPP), particularly our efforts to globally enable -Wimplicit-fallthrough and -fstrict-flex-arrays=3 in the upstream Linux kernel.
-Wimplicit-fallthroughThis warning flag warns when a fallthrough occurs unless it is specially marked as being intended. The Linux kernel project uses this flag; it led to the discovery and fixing of many bugs21.
- An end to implicit fall-throughs in the kernel (LWN.net article)
In this guide we recommend using the standard C99 flexible array notation [] instead of non-standard [0] or misleading [1], and then using -fstrict-flex-arrays=3 to improve bounds checking in such cases. In this case, code that uses [0] for a flexible array will need to be modified to use [] instead. Code that uses [1] for a flexible arrays needs to be modified to use [] and also extensively modified to eliminate off-by-one errors. Using [1] is not just misleading39, it’s error-prone; beware that existing code using [1] to indicate a flexible array may currently have off-by-one errors40.
- Safer flexible arrays for the kernel (LWN.net article)
- Progress On Bounds Checking in C and the Linux Kernel – Kees Cook, Google & Gustavo A. R. Silva (Presentation on YouTube)
The work of Qing Zhao is also referenced in the guide. Qing is making significant contributions to the KSPP by implementing hardening features in GCC, which we want to adopt in the Linux kernel.
- GCC features to help harden the kernel (LWN.net article)
In conclusion, it’s quite fulfilling to see the hardening work we undertake in the Kernel Self-Protection Project having a significant influence in the world of software security, beyond the Linux kernel.
SLAM: a new Spectre technique
In response to SLAM, Intel made plans to provide software guidance prior to the future release of Intel processors which support LAM (e.g., deploying LAM jointly with LASS). Linux engineers developed patches to disable LAM by default until further guidance is available. ARM published an advisory to provide guidance on future TBI-enabled CPUs. AMD did not implement guidance updates and pointed to existing Spectre v2 mitigations to address the SLAM exploit described in the paper.
See the full paper for the details.
Security updates for Wednesday
Hihetetlen, de már 40 éves a Turbo Pascal
Kamionokról vonatokra és hajókra vált Európában az Amazon
[$] Supplementing CVEs with !CVEs
Security updates for Tuesday
Matthew Garrett: Why does Gnome fingerprint unlock not unlock the keyring?
Fingerprint detection can be done in two primary ways. The first is that a fingerprint reader is effectively just a scanner - it passes a graphical representation of the fingerprint back to the OS and the OS decides whether or not it matches an enrolled finger. The second is for the fingerprint reader to make that determination itself, either storing a set of trusted fingerprints in its own storage or supporting being passed a set of encrypted images to compare against. Fprint supports both of these, but note that in both cases all that we get at the end of the day is a statement of "The fingerprint matched" or "The fingerprint didn't match" - we can't associate anything else with that.
Apple's solution involves wiring the fingerprint reader to a secure enclave, an independently running security chip that can store encrypted secrets or keys and only release them under pre-defined circumstances. Rather than the fingerprint reader providing information directly to the OS, it provides it to the secure enclave. If the fingerprint matches, the secure enclave can then provide some otherwise secret material to the OS. Critically, if the fingerprint doesn't match, the enclave will never release this material.
And that's the difference. When you perform TouchID authentication, the secure enclave can decide to release a secret that can be used to decrypt your keyring. We can't easily do this under Linux because we don't have an interface to store those secrets. The secret material can't just be stored on disk - that would allow anyone who had access to the disk to use that material to decrypt the keyring and get access to the passwords, defeating the object. We can't use the TPM because there's no secure communications channel between the fingerprint reader and the TPM, so we can't configure the TPM to release secrets only if an associated fingerprint is provided.
So the simple answer is that fingerprint unlock doesn't unlock the keyring because there's currently no secure way to do that. It's not intransigence on the part of the developers or a conspiracy to make life more annoying. It'd be great to fix it, but I don't see an easy way to do so at the moment.
comments