diff options
author | Matthew Garrett <mjg@redhat.com> | 2012-04-30 16:11:30 -0400 |
---|---|---|
committer | Greg Kroah-Hartman <gregkh@linuxfoundation.org> | 2012-05-07 08:56:38 -0700 |
commit | 173c412ef8f37d781eb90f5cc8eeab118b987e68 (patch) | |
tree | 61a091ed208a07757dfde7673855720db9756083 /fs | |
parent | ca14f0481bc8653c39e7b2fca81bc5131ac9afa8 (diff) | |
download | kernel_samsung_tuna-173c412ef8f37d781eb90f5cc8eeab118b987e68.zip kernel_samsung_tuna-173c412ef8f37d781eb90f5cc8eeab118b987e68.tar.gz kernel_samsung_tuna-173c412ef8f37d781eb90f5cc8eeab118b987e68.tar.bz2 |
efi: Validate UEFI boot variables
commit fec6c20b570bcf541e581fc97f2e0cbdb9725b98 upstream.
A common flaw in UEFI systems is a refusal to POST triggered by a malformed
boot variable. Once in this state, machines may only be restored by
reflashing their firmware with an external hardware device. While this is
obviously a firmware bug, the serious nature of the outcome suggests that
operating systems should filter their variable writes in order to prevent
a malicious user from rendering the machine unusable.
Signed-off-by: Matthew Garrett <mjg@redhat.com>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Diffstat (limited to 'fs')
0 files changed, 0 insertions, 0 deletions