diff options
author | Patrick Rudolph <patrick.rudolph@9elements.com> | 2020-05-06 11:58:45 +0200 |
---|---|---|
committer | Patrick Georgi <pgeorgi@google.com> | 2020-08-21 07:51:07 +0000 |
commit | 9f8f11513a5db45b224f764525eae9c64fcfe360 (patch) | |
tree | be1b5a603cc8d19e96ef0bf31037e9975c6a6c8b /src/southbridge/intel/lynxpoint/me_9.x.c | |
parent | 37ac368c780568628e45c6fa93aaa55a2030c06b (diff) |
SMM: Validate more user-provided pointers
Mitigate issues presented in "Digging Into The Core of Boot" found by
"Yuriy Bulygin" and "Oleksandr Bazhaniuk" at RECON-MTL-2017.
Validate user-provided pointers using the newly-added functions.
This protects SMM from ring0 attacks.
Change-Id: I8a347ccdd20816924bf1bceb3b24bf7b22309312
Signed-off-by: Patrick Rudolph <patrick.rudolph@9elements.com>
Signed-off-by: Christian Walter <christian.walter@9elements.com>
Reviewed-on: https://review.coreboot.org/c/coreboot/+/41086
Tested-by: build bot (Jenkins) <no-reply@coreboot.org>
Reviewed-by: Tim Wawrzynczak <twawrzynczak@chromium.org>
Diffstat (limited to 'src/southbridge/intel/lynxpoint/me_9.x.c')
0 files changed, 0 insertions, 0 deletions