The first patch (for MdeModulePkg) fixes a bug that is exposed (triggered) by the third patch.
The second and third patches fix a security vulnerability in OVMF that I reported to the UEFI SRT more than three weeks ago: To: [email protected], [email protected] [...] From: Laszlo Ersek <[email protected]> Subject: OVMF PlatformBds allows circumvention of SMM Message-ID: <[email protected]> Date: Sun, 3 Apr 2016 16:15:09 +0200 I have not received any response thus far. As can be seen above, I also reported the issue to the Red Hat SRT. While I received acknowledgement about my report, there has been no technical feedback either. Now, this issue has very low impact in my opinion: - Configurations (that is, (host kernel, QEMU, OVMF firmware) triplets) on which the issue being fixed is *actually* a vulnerability count as "very recent" and "sporadic" at best. I'm not aware of any deployments where such a configuration is put to use in a production environment. - If Secure Boot is enabled, then the attacker's job is much harder: he cannot install just any UEFI driver in DriverOrder (see the second patch for more explanation), he must instead exploit a bug in an already signed UEFI driver, before that driver is blacklisted in DBX. Independently, Ray's work for porting OvmfPkg to MdeModulePkg/BDS includes a patch, namely [edk2] [Patch v3 11/23] OvmfPkg/PlatformBds: Initialize console variables in *BeforeConsole() http://thread.gmane.org/gmane.comp.bios.edk2.devel/10859/focus=11039 that needs to connect the PCI root bridges on the call stack of PlatformBdsInit(), not the current PlatformBdsPolicyBehavior(). Since patch #2 in this series implements a superset of that requirement, and given the low impact of the security issue (and the unresponsiveness of the USRT), it makes sense for me to post this small series first, and for Ray to rebase his work on top second. I tested these changes in OVMF, with { S3 enabled, S3 disabled } x { SMM enabled, SMM disabled }, using Fedora guests. Public branch: <https://github.com/lersek/edk2/commits/lockdown_smm>. Cc: Feng Tian <[email protected]> Cc: Jiewen Yao <[email protected]> Cc: Jordan Justen <[email protected]> Cc: Ruiyu Ni <[email protected]> Cc: Star Zeng <[email protected]> Thanks Laszlo Laszlo Ersek (3): MdeModulePkg: PiDxeS3BootScriptLib: honor PcdAcpiS3Enable OvmfPkg: PlatformBdsLib: lock down SMM in PlatformBdsInit() OvmfPkg: PlatformBdsLib: lock down SMM regardless of S3 MdeModulePkg/Library/PiDxeS3BootScriptLib/DxeS3BootScriptLib.inf | 1 + MdeModulePkg/Library/PiDxeS3BootScriptLib/BootScriptSave.c | 4 + OvmfPkg/Library/PlatformBdsLib/BdsPlatform.c | 89 ++++++++++++-------- 3 files changed, 58 insertions(+), 36 deletions(-) -- 1.8.3.1 _______________________________________________ edk2-devel mailing list [email protected] https://lists.01.org/mailman/listinfo/edk2-devel

