mirror of
https://github.com/ARM-software/arm-trusted-firmware.git
synced 2025-04-11 07:04:22 +00:00
![]() In image_encrypt function, vulnerability arises due to a mismatch between unsigned and signed integer types. When a large unsigned integer is returned by strlen and stored into signed integer k, the value represented is a large negative integer. This bypasses the subsequent check against AES_BLOCK_SZ and allows a buffer overflow to happen at memcpy. Similar, vulnerability issue is fixed in function verify_and_copy_file_name_entry. Change-Id: I658521c1eec1c79933ba8082ba507df04d174e52 Signed-off-by: Jaiprakash Singh <jaiprakashs@marvell.com> |
||
---|---|---|
.. | ||
secure | ||
doimage.c | ||
doimage.mk | ||
Makefile |