-
Notifications
You must be signed in to change notification settings - Fork 31
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
no difference when verifying Sinkclose fix in agesa ComboAM4v2PI-1.2.0.Cc #15
Comments
Enabled secure boot in bios and configured linux to boot in secure boot mode, hoping to see some change with platbox regarding Sinkclose when using bios with agesa ComboAM4v2PI-1.2.0.Cc, but there is no change visible either (apart from SMM_BASE) - attaching the log from platbox-cli of this test run.
platbox-agesa-ComboAM4v2PI-1.2.0.Cc-SecureBootYES-ROMarmorYES.txt Any ideas? |
Just bricked my motherboard after running Is that mitigation for CVE-2023-31315 supposed to allow direct spi writes to bios flash? After running the poc two times in a single session, while having RomArmor and SecureBoot active in linux boot, the poc showed only FF data, but clearly the write somehow succeeded as I even could read the data back from platbox_cli with Reboot failed, as it hang in power cycling endless loop without even showing any post code on the postcode display on the motherboard (the display did not light up at all). Dumped the spi flash content via spi programmer, got many strange changes there, but the two runs of the poc clearly went through, even though they somehow miss the first char:
The following does not really look healthy:
Fixed the output from chipset command in linux to get the error/ok tags on proper places (used stdout instead of stderr) and got following output with ComboAM4v2PI-1.2.0.Cc agesa both romarmor and secure boot enabled:
|
The output shows that ROM Armor is not enabled:
To your original question, there is no update made at this point to Platbox that checks the state of the sinkclose vulnerability. The new code is going to be released mid November. |
Tried to use platbox_cli in linux, it seems to work, at least dump_spi retrieves correct bios flash content and chipset command shows some info similar to screenshots in the project's readme.
But comparing the behavior when running bios with agesa ComboAM4v2PI-1.2.0.B vs the case when running bios with ComboAM4v2PI-1.2.0.Cc (which should fix Sinkclose), there is no change in platbox_cli output that would hint the vulnerability got actually fixed, basically differing only in SMM_BASE - please see the attached logs. Flash content could also be read in all cases.
Could you please explain what we should see when a platform is vulnerable vs when a platform is not vulnerable?
Thank you.
Please note, the BIOS has been flashed via external SPI programmer in case of platbox-agesa-ComboAM4v2PI-1.2.0.Cc-ROMarmorYES.txt file.
platbox-agesa-ComboAM4v2PI-1.2.0.B-ROMarmorNO.txt
platbox-agesa-ComboAM4v2PI-1.2.0.B-ROMarmorYES.txt
platbox-agesa-ComboAM4v2PI-1.2.0.Cc-ROMarmorNO.txt
platbox-agesa-ComboAM4v2PI-1.2.0.Cc-ROMarmorYES.txt
The text was updated successfully, but these errors were encountered: