All of lore.kernel.org
 help / color / mirror / Atom feed
* [U-Boot] Buffer overrun risk in UBI SPL for secure boot
@ 2019-09-04  4:57 Joel Peshkin
  2019-09-04 13:01 ` Heiko Schocher
  0 siblings, 1 reply; 4+ messages in thread
From: Joel Peshkin @ 2019-09-04  4:57 UTC (permalink / raw)
  To: u-boot

It seems that, in the process of doing any sort of secure boot chain of
trust, anything loading a UBI volume in preparation to authenticate it,
will load a volume of unknown size into a buffer prior to checking the
signature of that volume.

Has anyone considered a solution for this?  Should all implementations just
carve out a buffer at the top of memory for ubispl_load_volume or should
the ubispl_load data structure be amended to include a size?  It would seem
appropriate to include a size, but not clear how to do that without
breaking compatibility with existing implementations.

^ permalink raw reply	[flat|nested] 4+ messages in thread

end of thread, other threads:[~2019-09-09 21:48 UTC | newest]

Thread overview: 4+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2019-09-04  4:57 [U-Boot] Buffer overrun risk in UBI SPL for secure boot Joel Peshkin
2019-09-04 13:01 ` Heiko Schocher
2019-09-04 14:19   ` Joel Peshkin
2019-09-09 21:48     ` Joel Peshkin

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.