[Bug 1388262] [NEW] Prevent unsuitable scanning of /dev/mem and enable SMBIOS support for all UEFI platforms
Leif Lindholm
1388262 at bugs.launchpad.net
Fri Oct 31 21:49:23 UTC 2014
Public bug reported:
SMBIOS defines that on x86 platforms one can scan for an entry point in
the physical address range 0xf0000-0xfffff - which is achieved by
mmapping /dev/mem. However, this is invalid for most other
architectures. Meanwhile, UEFI has alternative defined methods of
discovery, so SMBIOS data can be easily found on at least IA64, ARM and
AArch64.
lshw currently has a stack of ifdefs to not attempt scanning on certain
listed architectures. New architectures, like AArch64, end up with the
lshw command potentially reading sensitive i/o regions, causing system
crashes.
The attached patch (which has been logged in upstream ticketing system,
but is pending moderation there) flips the logic to only perform raw
memory scanning on i386/x86_64 and also enables looking for SMBIOS
tables on all UEFI platforms (in a safe manner).
** Affects: lshw (Ubuntu)
Importance: Undecided
Status: New
** Attachment added: "smbios-noscan.patch"
https://bugs.launchpad.net/bugs/1388262/+attachment/4250317/+files/smbios-noscan.patch
--
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to lshw in Ubuntu.
https://bugs.launchpad.net/bugs/1388262
Title:
Prevent unsuitable scanning of /dev/mem and enable SMBIOS support for
all UEFI platforms
Status in “lshw” package in Ubuntu:
New
Bug description:
SMBIOS defines that on x86 platforms one can scan for an entry point
in the physical address range 0xf0000-0xfffff - which is achieved by
mmapping /dev/mem. However, this is invalid for most other
architectures. Meanwhile, UEFI has alternative defined methods of
discovery, so SMBIOS data can be easily found on at least IA64, ARM
and AArch64.
lshw currently has a stack of ifdefs to not attempt scanning on
certain listed architectures. New architectures, like AArch64, end up
with the lshw command potentially reading sensitive i/o regions,
causing system crashes.
The attached patch (which has been logged in upstream ticketing
system, but is pending moderation there) flips the logic to only
perform raw memory scanning on i386/x86_64 and also enables looking
for SMBIOS tables on all UEFI platforms (in a safe manner).
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/lshw/+bug/1388262/+subscriptions
More information about the foundations-bugs
mailing list