mirror of
https://github.com/ARM-software/arm-trusted-firmware.git
synced 2025-04-04 11:53:55 +00:00
![]() In image_encrypt function, vulnerability arises due to a mismatch between unsigned and signed integer types. When a large unsigned integer is returned by strlen and stored into signed integer k, the value represented is a large negative integer. This bypasses the subsequent check against AES_BLOCK_SZ and allows a buffer overflow to happen at memcpy. Similar, vulnerability issue is fixed in function verify_and_copy_file_name_entry. Change-Id: I658521c1eec1c79933ba8082ba507df04d174e52 Signed-off-by: Jaiprakash Singh <jaiprakashs@marvell.com> |
||
---|---|---|
.. | ||
amlogic | ||
cert_create | ||
conventional-changelog-tf-a | ||
cot_dt2c | ||
encrypt_fw | ||
fiptool | ||
marvell/doimage | ||
memory | ||
nxp | ||
renesas | ||
sptool | ||
stm32image | ||
tlc |