efi: Restrict efivar_ssdt_load when the kernel is locked down (CVE-2019-20908)
This commit is contained in:
parent
8e18898678
commit
832de9e7d1
|
@ -40,6 +40,8 @@ linux (4.19.132-1) UNRELEASED; urgency=medium
|
||||||
* [rt] Update to 4.19.132-rt59
|
* [rt] Update to 4.19.132-rt59
|
||||||
* Revert "ath9k: Fix general protection fault in ath9k_hif_usb_rx_cb"
|
* Revert "ath9k: Fix general protection fault in ath9k_hif_usb_rx_cb"
|
||||||
(Closes: #964153, #964480)
|
(Closes: #964153, #964480)
|
||||||
|
* efi: Restrict efivar_ssdt_load when the kernel is locked down
|
||||||
|
(CVE-2019-20908)
|
||||||
|
|
||||||
-- Salvatore Bonaccorso <carnil@debian.org> Tue, 14 Jul 2020 21:48:28 +0200
|
-- Salvatore Bonaccorso <carnil@debian.org> Tue, 14 Jul 2020 21:48:28 +0200
|
||||||
|
|
||||||
|
|
|
@ -0,0 +1,36 @@
|
||||||
|
From: Matthew Garrett <matthewgarrett@google.com>
|
||||||
|
Date: Wed, 31 Jul 2019 15:16:16 -0700
|
||||||
|
Subject: efi: Restrict efivar_ssdt_load when the kernel is locked down
|
||||||
|
Origin: https://patchwork.kernel.org/patch/11069659/
|
||||||
|
|
||||||
|
efivar_ssdt_load allows the kernel to import arbitrary ACPI code from an
|
||||||
|
EFI variable, which gives arbitrary code execution in ring 0. Prevent
|
||||||
|
that when the kernel is locked down.
|
||||||
|
|
||||||
|
Signed-off-by: Matthew Garrett <mjg59@google.com>
|
||||||
|
Acked-by: Ard Biesheuvel <ard.biesheuvel@linaro.org>
|
||||||
|
Reviewed-by: Kees Cook <keescook@chromium.org>
|
||||||
|
Cc: Ard Biesheuvel <ard.biesheuvel@linaro.org>
|
||||||
|
Cc: linux-efi@vger.kernel.org
|
||||||
|
[bwh: Convert back to the non-LSM lockdown API]
|
||||||
|
---
|
||||||
|
--- a/drivers/firmware/efi/efi.c
|
||||||
|
+++ b/drivers/firmware/efi/efi.c
|
||||||
|
@@ -30,6 +30,7 @@
|
||||||
|
#include <linux/acpi.h>
|
||||||
|
#include <linux/ucs2_string.h>
|
||||||
|
#include <linux/memblock.h>
|
||||||
|
+#include <linux/security.h>
|
||||||
|
|
||||||
|
#include <asm/early_ioremap.h>
|
||||||
|
|
||||||
|
@@ -241,6 +242,9 @@ static void generic_ops_unregister(void)
|
||||||
|
static char efivar_ssdt[EFIVAR_SSDT_NAME_MAX] __initdata;
|
||||||
|
static int __init efivar_ssdt_setup(char *str)
|
||||||
|
{
|
||||||
|
+ if (kernel_is_locked_down("ACPI tables"))
|
||||||
|
+ return -EPERM;
|
||||||
|
+
|
||||||
|
if (strlen(str) < sizeof(efivar_ssdt))
|
||||||
|
memcpy(efivar_ssdt, str, strlen(str));
|
||||||
|
else
|
|
@ -133,6 +133,7 @@ features/all/lockdown/0026-Lock-down-kprobes.patch
|
||||||
features/all/lockdown/0027-bpf-Restrict-kernel-image-access-functions-when-the-.patch
|
features/all/lockdown/0027-bpf-Restrict-kernel-image-access-functions-when-the-.patch
|
||||||
features/all/lockdown/0028-efi-Add-an-EFI_SECURE_BOOT-flag-to-indicate-secure-b.patch
|
features/all/lockdown/0028-efi-Add-an-EFI_SECURE_BOOT-flag-to-indicate-secure-b.patch
|
||||||
features/all/lockdown/0029-efi-Lock-down-the-kernel-if-booted-in-secure-boot-mo.patch
|
features/all/lockdown/0029-efi-Lock-down-the-kernel-if-booted-in-secure-boot-mo.patch
|
||||||
|
features/all/lockdown/0032-efi-Restrict-efivar_ssdt_load-when-the-kernel-is-loc.patch
|
||||||
# some missing pieces
|
# some missing pieces
|
||||||
features/all/lockdown/enable-cold-boot-attack-mitigation.patch
|
features/all/lockdown/enable-cold-boot-attack-mitigation.patch
|
||||||
features/all/lockdown/mtd-disable-slram-and-phram-when-locked-down.patch
|
features/all/lockdown/mtd-disable-slram-and-phram-when-locked-down.patch
|
||||||
|
|
Loading…
Reference in New Issue