-
Notifications
You must be signed in to change notification settings - Fork 36
Description
Tried to use platbox_cli in linux, it seems to work, at least dump_spi retrieves correct bios flash content and chipset command shows some info similar to screenshots in the project's readme.
But comparing the behavior when running bios with agesa ComboAM4v2PI-1.2.0.B vs the case when running bios with ComboAM4v2PI-1.2.0.Cc (which should fix Sinkclose), there is no change in platbox_cli output that would hint the vulnerability got actually fixed, basically differing only in SMM_BASE - please see the attached logs. Flash content could also be read in all cases.
Could you please explain what we should see when a platform is vulnerable vs when a platform is not vulnerable?
Thank you.
Please note, the BIOS has been flashed via external SPI programmer in case of platbox-agesa-ComboAM4v2PI-1.2.0.Cc-ROMarmorYES.txt file.
platbox-agesa-ComboAM4v2PI-1.2.0.B-ROMarmorNO.txt
platbox-agesa-ComboAM4v2PI-1.2.0.B-ROMarmorYES.txt
platbox-agesa-ComboAM4v2PI-1.2.0.Cc-ROMarmorNO.txt
platbox-agesa-ComboAM4v2PI-1.2.0.Cc-ROMarmorYES.txt