On Mon, Jun 24, 2024 at 07:28:14PM +0200, Daniel Kiper wrote:
> On Thu, Mar 07, 2024 at 04:59:05PM +0800, Gary Lin via Grub-devel wrote:
> > On Thu, Feb 08, 2024 at 08:58:43PM +0100, Daniel Kiper wrote:
> > > Hey,
> > >
> > --8<--
> > >
> > > And I have attached the Coverity report. All issues reported there have
> > > to be fixed. If you cannot fix an issue you have to explain why you
> > > cannot do that and what is potential impact on the code stability,
> > > security, etc.
> > >
> > I have went through all the coverity issues. There are 6 issues in the
> > TPM2 stack and the utility:
> >
> > CID 435775, CID 435771, CID 435770, CID 435769, CID 435767, CID 435761
> >
> > Those will be fixed in the next version.
> >
> > The 9 issues are from libtasn1 and gnulib.
> >
> > There are two memory corruption issue: CID 435762 and CID 435766, and
> > I've filed the issues in libtasn1 upstream.
> >
> > - CID 435762
> >   https://gitlab.com/gnutls/libtasn1/-/issues/49
> >   This is a valid case. However, the only exploitable function,
> >   _asn1_insert_tag_der(), is disabled in grub2 patch, so the severity is
> >   low. I have a quick fix but upstream would like to fix it in another
> >   way.
> > - CID 435766
> >   https://gitlab.com/gnutls/libtasn1/-/issues/50
> >   IMO, this is false positive, but I need libtasn1 upstream to confirm
> >   that.
> >
> > Then, the remaining 7 Integer handling issues are involved with the macros
> > from gnulib, and I believe those are false positive.
> >
> > The following are my analyses:
> >
> > ________________________________________________________________________________________________________
> > *** CID 435774:  Integer handling issues  (CONSTANT_EXPRESSION_RESULT)
> > /grub-core/lib/libtasn1/lib/decoding.c: 481 in asn1_get_object_id_der()
> > 475            */
> > 476           if (leading != 0 && der[len_len + k] == 0x80)
> > 477         return ASN1_DER_ERROR;
> > 478           leading = 0;
> > 479
> > 480           /* check for wrap around */
> > >>>     CID 435774:  Integer handling issues  (CONSTANT_EXPRESSION_RESULT)
> > >>>     "val < ((((1 ? 0 : val) - 1 < 0) ? ~((((1 ? 0 : val) + 1 << 62UL /* 
> > >>> sizeof (+val) * 8 - 2 */) - 1) * 2 + 1) : ((1 ? 0 : val) + 0)) >> 7)" 
> > >>> is always false regardless of the values of its operands. This occurs 
> > >>> as the second operand of "?:".
> > 481           if (INT_LEFT_SHIFT_OVERFLOW (val, 7))
> > 482         return ASN1_DER_ERROR;
> > 483
> > 484           val = val << 7;
> > 485           val |= der[len_len + k] & 0x7F;
> > 486
> >
> > Here are the related macros:
> >
> > #define EXPR_SIGNED(e) (_GL_INT_NEGATE_CONVERT (e, 1) < 0)
> >
> > #define _GL_INT_CONVERT(e, v) ((1 ? 0 : (e)) + (v))
> >
> > #define _GL_SIGNED_INT_MAXIMUM(e)                                       \
> >   (((_GL_INT_CONVERT (e, 1) << (TYPE_WIDTH (+ (e)) - 2)) - 1) * 2 + 1)
> >
> > #define _GL_INT_MINIMUM(e)                                              \
> >   (EXPR_SIGNED (e)                                                      \
> >    ? ~ _GL_SIGNED_INT_MAXIMUM (e)                                       \
> >    : _GL_INT_CONVERT (e, 0))
> >
> > #define INT_LEFT_SHIFT_OVERFLOW(a, b) \
> >   INT_LEFT_SHIFT_RANGE_OVERFLOW (a, b, \
> >                                  _GL_INT_MINIMUM (a), _GL_INT_MAXIMUM (a))
> >
> > #define INT_LEFT_SHIFT_RANGE_OVERFLOW(a, b, min, max)   \
> >   ((a) < 0                                              \
> >    ? (a) < (min) >> (b)                                 \
> >    : (max) >> (b) < (a))
> >
> > The statement in question is expanded "(a) < (min) >> (b)" of
> > INT_LEFT_SHIFT_RANGE_OVERFLOW. Since 'val' is 'uint64_t', '(a) < 0' is 
> > always
> > false, so the result of that statement doen't matter.
> 
> Something is missing and/or requires clarification/expansion here.
> AFAICT at least your description completely ignores "(max) >> (b) < (a)"
> expression result.
> 
Because Coverity only complained "(a) < (min) >> (b)".
"(max) >> (b) < (a)" does the right thing to check whether 'a' is
overflowed after the left shift.

> > ________________________________________________________________________________________________________
> > *** CID 435773:  Integer handling issues  (NO_EFFECT)
> > /grub-core/lib/libtasn1/lib/decoding.c: 439 in asn1_get_object_id_der()
> > 433         return ASN1_DER_ERROR;
> > 434
> > 435       val0 = 0;
> > 436
> > 437       for (k = 0; k < len; k++)
> > 438         {
> > >>>     CID 435773:  Integer handling issues  (NO_EFFECT)
> > >>>     This less-than-zero comparison of an unsigned value is never true. 
> > >>> "(1 ? 0UL : val0) - 1UL < 0UL".
> > 439           if (INT_LEFT_SHIFT_OVERFLOW (val0, 7))
> > 440         return ASN1_DER_ERROR;
> > 441
> > 442           val0 <<= 7;
> > 443           val0 |= der[len_len + k] & 0x7F;
> > 444           if (!(der[len_len + k] & 0x80))
> >
> > Here are the related macros:
> >
> > #define _GL_INT_NEGATE_CONVERT(e, v) ((1 ? 0 : (e)) - (v))
> > #define EXPR_SIGNED(e) (_GL_INT_NEGATE_CONVERT (e, 1) < 0)
> >
> > The statement in question is the expanded 'EXPR_SIGNED'. Since that macro is
> > to test whether the variable is signed or not. For 'uint64_t val0', it's
> > expected to be always false.
> >
> > ________________________________________________________________________________________________________
> > *** CID 435772:  Integer handling issues  (NO_EFFECT)
> > /grub-core/lib/libtasn1/lib/decoding.c: 204 in asn1_get_tag_der()
> > 198           /* Long form */
> > 199           punt = 1;
> > 200           ris = 0;
> > 201           while (punt < der_len && der[punt] & 128)
> > 202         {
> > 203
> > >>>     CID 435772:  Integer handling issues  (NO_EFFECT)
> > >>>     This less-than-zero comparison of an unsigned value is never true. 
> > >>> "(1 ? 0U : ((1 ? 0U : ris) + 128U)) - 1U < 0U".
> > 204           if (INT_MULTIPLY_OVERFLOW (ris, 128))
> > 205             return ASN1_DER_ERROR;
> > 206           ris *= 128;
> > 207
> > 208           if (INT_ADD_OVERFLOW (ris, ((unsigned) (der[punt] & 0x7F))))
> > 209             return ASN1_DER_ERROR;
> >
> > Here are the related macros:
> >
> > #define _GL_INT_CONVERT(e, v) ((1 ? 0 : (e)) + (v))
> > #define _GL_INT_NEGATE_CONVERT(e, v) ((1 ? 0 : (e)) - (v))
> > #define EXPR_SIGNED(e) (_GL_INT_NEGATE_CONVERT (e, 1) < 0)
> >
> > The statement in question is the expanded 'EXPR_SIGNED(_GL_INT_CONVERT 
> > (ris, 128))'.
> > Since 'ris' is 'unsigned int', it's expected that 'EXPR_SIGNED' always
> > returns false.
> 
> At least INT_MULTIPLY_OVERFLOW definitions is missing.
> 
I got to admit that lots of details were skipped since the expansion of
INT_MULTIPLY_OVERFLOW is really lengthy.

I'll add the details back in my v18 patchset cover letter.

Gary Lin

> Please double check other analysis too. If you provide correct analysis
> for all non-fixable CIDs I will mark them as ignored. It would be nice
> if updated analysis is a part of latest version of the patch set.

_______________________________________________
Grub-devel mailing list
Grub-devel@gnu.org
https://lists.gnu.org/mailman/listinfo/grub-devel

Reply via email to