]> git.proxmox.com Git - mirror_edk2.git/commit - MdeModulePkg/MdeModulePkg.uni
MdeModulePkg: Add new PCD to control the evacuate temporary memory feature (CVE-2019...
authorGuomin Jiang <guomin.jiang@intel.com>
Wed, 8 Jul 2020 01:33:46 +0000 (09:33 +0800)
committermergify[bot] <37929162+mergify[bot]@users.noreply.github.com>
Tue, 28 Jul 2020 01:43:16 +0000 (01:43 +0000)
commit1facb8fdef6389f390b66da6d8304f54cc93104a
tree0b09b4df978e8ebc995b6a7df545c84f367c8cd2
parenta44f558a84c67cd88b8215d4c076123cf58438f4
MdeModulePkg: Add new PCD to control the evacuate temporary memory feature (CVE-2019-11098)

REF:https://bugzilla.tianocore.org/show_bug.cgi?id=1614

The security researcher found that we can get control after NEM disable.

The reason is that the flash content reside in NEM at startup and the
code will get the content from flash directly after disable NEM.

To avoid this vulnerability, the feature will copy the PEIMs from
temporary memory to permanent memory and only execute the code in
permanent memory.

The vulnerability is exist in physical platform and haven't report in
virtual platform, so the virtual can disable the feature currently.

When enable the PcdMigrateTemporaryRamFirmwareVolumes, always shadow
all PEIMs no matter the condition of PcdShadowPeimOnBoot or
PcdShadowPeimOnS3Boot.

Cc: Jian J Wang <jian.j.wang@intel.com>
Cc: Hao A Wu <hao.a.wu@intel.com>
Signed-off-by: Guomin Jiang <guomin.jiang@intel.com>
Reviewed-by: Liming Gao <liming.gao@intel.com>
Acked-by: Laszlo Ersek <lersek@redhat.com>
MdeModulePkg/MdeModulePkg.dec
MdeModulePkg/MdeModulePkg.uni