efi: Validate UEFI boot variables
authorMatthew Garrett <mjg@redhat.com>
Mon, 30 Apr 2012 20:11:30 +0000 (16:11 -0400)
committerBen Hutchings <ben@decadent.org.uk>
Fri, 11 May 2012 12:14:48 +0000 (13:14 +0100)
commitbb1e005ee88b73be502eb42ca6bdb4c7295b7b3c
treee4e8e06fada7c4ac3926329542e4ba28f1fc39d8
parent3a91135a4b1720f83810399e596937598b38b158
efi: Validate UEFI boot variables

commit fec6c20b570bcf541e581fc97f2e0cbdb9725b98 upstream.

A common flaw in UEFI systems is a refusal to POST triggered by a malformed
boot variable. Once in this state, machines may only be restored by
reflashing their firmware with an external hardware device. While this is
obviously a firmware bug, the serious nature of the outcome suggests that
operating systems should filter their variable writes in order to prevent
a malicious user from rendering the machine unusable.

Signed-off-by: Matthew Garrett <mjg@redhat.com>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
Signed-off-by: Ben Hutchings <ben@decadent.org.uk>
drivers/firmware/efivars.c