Teardown of Apple Lightning video adapters (Haywire)


Click on the above Twitter URL for a thread with a teardown of Apple Lightning video adapters.

Slightly more info:
https://www.theiphonewiki.com/wiki/Haywire
https://panic.com/blog/the-lightning-digital-av-adapter-surprise/
https://www.apple.com/ca/shop/campaigns/lightning-connector
https://news.ycombinator.com/item?id=20544564 https://news.ycombinator.com/item?id=5307781

GRUB 2.04 release for ARM

Leif of Linaro posted a message with a bit of background on — and some patches for — GRUB on ARM, including the latest 2.04 release:

Spoiler alert, prepare a cup of coffee:

[...]Anyway, if you got this far, have (another) cup of coffee.

See-also: https://www.gnu.org/software/grub/manual/grub/grub.html
http://git.savannah.gnu.org/cgit/grub.git/

FWTS 19.07.00 is released

The July monthly release of FWTS (FirmWare Test Suite) is out, with multiple Intel MSR register tests, an ACPICA update. Hmm, all the URLs from the announcement are HTTPS …except the source link is HTTP. 😦 And the binary link for FWTS-live is also HTTP.

https://wiki.ubuntu.com/FirmwareTestSuite/ReleaseNotes/19.07.00
https://lists.01.org/pipermail/luv/2019-July/003156.html
https://launchpad.net/ubuntu/+source/fwts
https://launchpad.net/~firmware-testing-team/+archive/ubuntu/ppa-fwts-stable
http://fwts.ubuntu.com/release/fwts-V19.07.00.tar.gz

http://fwts.ubuntu.com/fwts-live/fwts-live-19.07.00.img.xz

selfblow: [NVIDIA CVE‑2019‑5680] Selfblow exploit, when nvtboot blows a hole in itself

NVIDIA has released software security updates for NVIDIA® Jetson™ TX1 in the NVIDIA® Tegra® Linux Driver Package (L4T). The update addresses issues that may lead to code execution, denial of service, or escalation of privileges. To protect your system, download available updates from NVIDIA DevZone.[…]

https://nvidia.custhelp.com/app/answers/detail/a_id/4835

https://nvd.nist.gov/vuln/detail/CVE-2019-5680

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5680

This is an untethered coldboot exploit and as far as i can tell it affects every single Tegra device released so far. (Except the Nintendo Switch since it uses a custom bootloader.) Completely defeats secure boot even on latest firmware.[…]

https://github.com/balika011/selfblow

U-Boot NFS RCE Vulnerabilities (CVE-2019-14192)

By: Fermín J. Serna
July 24, 2019

This post is about 13 remote-code-execution vulnerabilities in the U-Boot boot loader, which I found with my colleagues Pavel Avgustinov and Kevin Backhouse. The vulnerabilities can be triggered when U-Boot is configured to use the network for fetching the next stage boot resources. Please note that the vulnerability is not yet patched at https://gitlab.denx.de/u-boot/u-boot, and that I am making these vulnerabilities public at the request of U-Boot’s master custodian Tom Rini. For more information, check the timeline below.[…]

https://blog.semmle.com/uboot-rce-nfs-vulnerability/

coreboot GSoC update

Coreboot’s Google Summer of Code continues, with 2 students this Summer, with some Coverity fixes and UEFI improvements!

[GSoC] Ghidra firmware utilities, weeks 6-8
https://blogs.coreboot.org/blog/2019/07/17/gsoc-ghidra-firmware-utilities-weeks-6-8/

[GSoC] Ghidra firmware utilities, week 9
https://blogs.coreboot.org/blog/2019/07/24/4743/

[GSoC] Coreboot Coverity, weeks 5-7
https://blogs.coreboot.org/blog/2019/07/16/gsoc-coreboot-coverity-weeks-5-7/

Apple lets Nikolaj continue to work on UEFITool

Nikolaj stopped working on UEFITool when he joined Apple, because Apple apparently wouldn’t allow employees to work on open source projects. There’s been a change for the better:

If you haven’t looked at UEFITool yet, it is definately worth a look:

https://github.com/LongSoft/UEFITool

coreboot 4.10 released

[…]In nearly 8 months since 4.9 we had 198 authors commit 2538 changes to master. Of these, 85 authors made their first commit to coreboot[…] the tree grew by about 11000 lines of code plus 5000 lines of comments.[…]Added 28 mainboards[…]

See the below announcement for more details. Luckily, the coreboot project is pretty good at giving an overview of the changes for each release:

https://mail.coreboot.org/hyperkitty/list/coreboot@coreboot.org/thread/CHJ5JGGP4YKJAAFTXYAZAIRSQXHFEMBO/

USB Fuzzing: A USB Perspective

Syzkaller starts to support USB fuzzing recently and has already found over 80 bugs within the Linux kernel. Almost every fuzzing expert whom I talked to has started to apply their fuzzing techniques to USB because of the high-security impact and potential volume of vulnerabilities due to the complexity of USB itself. While this post is NOT about fuzzing or USB security in general, I hope to provide some insights for USB fuzzing in general as someone who has been doing research on USB security for a while.[…]

CERT-Bund: analysis of Windows 10 TPM and UEFI Secure Boot

[…]The objective of this work package is the analysis of the: (i) interactions between the Windows 10 operating system that is subject of analysis and the Trusted Platform Module (TPM); (ii) the role that the TPM plays in activities of the operating system, with a focus on the booting process (which we refer to as Windows boot); and (iii) the configuration and logging capabilities of the TPM. As required by the German Federal Office for Information Security, the TPM standard in focus is that of version 2.0.[…]

https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Cyber-Sicherheit/SiSyPHus/Workpackage5_TPM-Nutzung.html

Intel on firmware security