Mummunan rauni a cikin bootloader na GRUB2 wanda ke ba ku damar ketare UEFI Secure Boot

A cikin bootloader na GRUB2 bayyana 8 rauni. Mafi haɗari matsala (CVE-2020-10713), wanda ake kira BootHole, ba da dama ƙetare hanyar UEFI Secure Boot kuma shigar da malware marasa tabbaci. Mahimmancin wannan raunin shine don kawar da shi bai isa a sabunta GRUB2 ba, tunda maharin na iya amfani da kafofin watsa labarai mai bootable tare da tsohuwar sigar rashin ƙarfi da aka tabbatar da sa hannun dijital. Mai kai hari zai iya yin sulhu da tsarin tabbatarwa ba na Linux kawai ba, har ma da sauran tsarin aiki, gami da Windows.

Ana iya magance matsalar ta hanyar sabunta tsarin jerin soke takardar shaidar (dbx, UEFI List of Revocation), amma a wannan yanayin ikon yin amfani da tsoffin kafofin watsa labaru tare da Linux za a rasa. Wasu masana'antun kayan aiki sun riga sun haɗa da sabunta jerin takaddun takaddun sokewa a cikin firmware ɗin su; akan irin waɗannan tsarin, sabbin abubuwan da aka sabunta na rarrabawar Linux za'a iya loda su a cikin UEFI Secure Boot yanayin.

Don kawar da rauni a cikin rarrabawa, kuna buƙatar sabunta masu sakawa, bootloaders, fakitin kernel, fwupd firmware da shim Layer, samar da sabbin sa hannu na dijital a gare su. Za a buƙaci masu amfani don sabunta hotunan shigarwa da sauran kafofin watsa labaru masu bootable, da kuma ɗora lissafin soke takaddun shaida (dbx) cikin firmware na UEFI. Kafin sabunta dbx zuwa UEFI, tsarin ya kasance mai rauni ba tare da la'akari da shigar da sabuntawa a cikin OS ba.

Varfafawa ya haifar buffer ambaliya wanda za'a iya amfani dashi don aiwatar da lambar sabani yayin aikin taya.
Rashin lahani yana faruwa a lokacin da ake rarraba abubuwan da ke cikin fayil ɗin sanyi na grub.cfg, wanda yawanci yana cikin ESP (EFI System Partition) kuma mai hari yana iya gyara shi tare da haƙƙin gudanarwa ba tare da keta amincin shim da GRUB2 da aka sanya hannu ba. Saboda kurakurai a cikin lambar tantancewa, mai kula da kurakurai masu kisa YY_FATAL_ERROR ya nuna gargadi kawai, amma bai dakatar da shirin ba. Ana rage haɗarin rashin ƙarfi ta hanyar buƙatar samun dama ga tsarin; duk da haka, ana iya buƙatar matsalar don gabatar da rootkits ɓoye idan kuna da damar jiki zuwa kayan aiki (idan yana yiwuwa a yi taya daga kafofin watsa labaru na ku).

Yawancin rarrabawar Linux suna amfani da ƙarami shim Layer, Microsoft ta sanya hannu ta dijital. Wannan Layer yana tabbatar da GRUB2 tare da takaddun shaida, wanda ke ba masu haɓaka rarraba damar samun kowane kwaya da sabunta GRUB ta Microsoft. Rashin lahani yana ba da damar, ta hanyar canza abubuwan da ke cikin grub.cfg, don cimma nasarar aiwatar da lambar ku a matakin bayan nasarar tabbatar da shim, amma kafin loda tsarin aiki, shiga cikin sarkar amincewa lokacin da Secure Boot yanayin ke aiki da samun cikakken iko. a kan ƙarin tsarin taya, gami da loda wani OS, gyare-gyaren abubuwan tsarin aiki da ketare kariya Kullewa.

Mummunan rauni a cikin bootloader na GRUB2 wanda ke ba ku damar ketare UEFI Secure Boot

Sauran lahani a cikin GRUB2:

  • CVE-2020-14308 - buffer ambaliya saboda rashin duba girman yankin ƙwaƙwalwar ajiya da aka ware a grub_malloc;
  • CVE-2020-14309 - yawan adadin lamba a grub_squash_read_symlink, wanda zai iya haifar da rubuta bayanai fiye da abin da aka keɓe;
  • CVE-2020-14310 - yawan adadin lamba a cikin read_section_from_string, wanda zai iya haifar da rubuta bayanai fiye da abin da aka keɓe;
  • CVE-2020-14311 - yawan adadin lamba a cikin grub_ext2_read_link, wanda zai iya haifar da rubuta bayanai fiye da abin da aka keɓe;
  • CVE-2020-15705 - yana ba ku damar ɗora kernels waɗanda ba a sanya hannu ba yayin taya kai tsaye a cikin Secure Boot yanayin ba tare da shim Layer ba;
  • CVE-2020-15706 - samun damar zuwa wurin ƙwaƙwalwar ajiya da aka riga aka 'yanta (amfani bayan-kyauta) lokacin sake fasalin aiki a lokacin aiki;
  • CVE-2020-15707 - ambaliya lamba a cikin mai sarrafa girman initrd.

An fitar da sabuntawar fakitin Hotfix don Debian, Ubuntu, RHEL и SUSE. don GRUB2 shawara saitin faci.

source: budenet.ru

Add a comment