New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

luks, hold down enter vuln in 3.2 CVE-2016-4484 #2907

Open
xahare opened this Issue Jul 13, 2017 · 0 comments

Comments

Projects
None yet
2 participants
@xahare

xahare commented Jul 13, 2017

Qubes OS version (e.g., R3.2):

3.2 testing

Affected TemplateVMs (e.g., fedora-23, if applicable):

apparently dom0, so fedora-23.


Expected behavior:

boot to luks prompt to enter disk passphrase, hold down enter, nothing happens

Actual behavior:

boot to luks prompt to enter disk passphrase, hold down enter, get initrd root shell

Steps to reproduce the behavior:

boot to luks prompt, hold down enter for, in my case 3 minutes and 20 seconds.

General notes:

see CVE-2016-4484

I thought this was discussed on the list, but a search on the cve didnt find anything.

http://hmarco.org/bugs/CVE-2016-4484/CVE-2016-4484_cryptsetup_initrd_shell.html

fedora 24 is mentioned as vulnerable at the time of that writing. is this already fixed in fedora 25? if so will qubes 3.2.1 be affected?

mitigations

  • AEM to detect tampering
  • add bios boot password
  • add rd.shell=0 to kernel command line

possible mitigations, havent tried

  • add grub boot password

adding yet another password would be a pain to users. rd.shell=0 is probably the best mitigation for those without aem.

severity is minor, given that the evil maid can open up a laptop. but, the fix is so easy, it would be silly not to.


Related issues:

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment