This version includes the following new or updated modules:
- `tools.vmm.xen.xsa188` - new proof-of-concept module for Xen XSA-188 / CVE-2016-7154 "use after free in FIFO event channel code" (https://xenbits.xen.org/xsa/advisory-188.html)
- `tools.vmm.xen.hypercallfuzz` - refactored and enhanced Xen hypercall fuzzer which discovered Xen XSA-188
- `tools.uefi.blacklist` - extended black-list configuration file with detection of EFI binaries affected by SystemSmmRuntimeRt a.k.a. 'ThinkPwn' vulnerability discovered by Dmytro Oleksiuk (http://blog.cr4.sh/2016/06/exploring-and-exploiting-lenovo.html)
This version includes the following new functionality:
- Significant improvements in installing CHIPSEC package, including from PyPI
- Added Mac OS X support with limited functionality (Alpha)
- Improved CHIPSEC service management on Windows
- Added support of "Native OS API" mode which in certain cases can use native OS API instead of CHIPSEC kernel module
- Added support of VIRTIO virtual devices
- Added support of VMM hypercall interfaces from Linux VMs
- Added parsing of EFI firmware update capsules and RAW sections
- Improved UEFI VSS variable format parsing
- Added support of Intel 7th Generation Core based platforms
This version includes the following fixes:
- Fixed calculation of SPI flash protected ranges PRx
- Updated SPI HAL to use XML config
- Added checking that SPI hardware sequencing is enabled