diff options
| author | Peter Jones <pjones@redhat.com> | 2023-07-27 14:57:32 -0400 |
|---|---|---|
| committer | Peter Jones <pjones@redhat.com> | 2023-12-05 13:19:02 -0500 |
| commit | 93ce2552f3e9f71f888a672913bfc0eef255c56d (patch) | |
| tree | ba7fa6c501dd8cd2a2363174f29fc8ac83dae881 /Cryptlib/opensslconf-diff.patch | |
| parent | e912071b8a6045549c2d1e7b5e1b2150c33ef519 (diff) | |
| download | efi-boot-shim-93ce2552f3e9f71f888a672913bfc0eef255c56d.tar.gz efi-boot-shim-93ce2552f3e9f71f888a672913bfc0eef255c56d.zip | |
CVE-2023-40550 pe: Fix an out-of-bound read in verify_buffer_sbat()
In verify_buffer_sbat(), we have a goal-seeking loop to find the .sbat
section header. Unfortunately, while the actual contents of the section
are checked for being inside the binary, no such check exists for the
contents of the section table entry.
As a result, a carefully constructed binary will cause an out-of-bounds
read checking if the section name is ".sbat\0\0\0" or not.
This patch adds a check that each section table entry is within the
bounds of the binary.
It's not currently known if this is actually exploitable beyond creating
a denial of service, and an attacker who is in a position to use it for
a denial of service attack must already be able to do so.
Resolves: CVE-2023-40550
Reported-by: gkirkpatrick@google.com
Signed-off-by: Peter Jones <pjones@redhat.com>
Diffstat (limited to 'Cryptlib/opensslconf-diff.patch')
0 files changed, 0 insertions, 0 deletions
