This is in regards to this vulnerability and the state of current fix for it. The vuln was reported by James Blake and this is the current fix for it as far as I can tell:

http://hg.code.sf.net/p/tboot/code/code?cmd=changeset;node=0efdaf7c5348

In a posted message, it was pointed out that this fix is insufficient and we believe that to be true too:

http://sourceforge.net/p/tboot/mailman/message/32760688/

It is not clear to me why the first item on the command line has to be skipped when it happens to be the image file name. The command line is what the boot-loader passed whether it includes a file name up front or not. It seems a much simpler and cleaner approach would be like the one from James Blake that I attached.

Thanks

--
Ross Philipson
tboot: measure all command line arguments (CVE-2014-5118)

JP Blake's patch to address CVE-2014-5118.

Upstream-status: This patch was submitted upstream, but tboot took a different
approach to fixing it.  However, their fix is currently incomplete:
http://sourceforge.net/p/tboot/mailman/message/32760688/

Reported-by: James Blake <bla...@ainfosec.com>
Signed-off-by: James Blake <bla...@ainfosec.com>
Signed-off-by: Chris Patterson <patters...@ainfosec.com>

diff -rupN tboot-1.7.0/tboot/common/policy.c tboot-1.7.0-patched/tboot/common/policy.c
--- tboot-1.7.0/tboot/common/policy.c	2012-01-15 10:21:20.000000000 -0500
+++ tboot-1.7.0-patched/tboot/common/policy.c	2014-11-07 12:11:02.966141513 -0500
@@ -383,8 +383,6 @@ static bool hash_module(tb_hash_t *hash,
     /* hash command line */
     if ( cmdline == NULL )
         cmdline = "";
-    else
-        cmdline = skip_filename(cmdline);
     if ( !hash_buffer((const unsigned char *)cmdline, strlen(cmdline), hash,
                       hash_alg) )
         return false;
------------------------------------------------------------------------------
_______________________________________________
tboot-devel mailing list
tboot-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/tboot-devel

Reply via email to