On 7 November 2018 at 11:51, Tom Rini <[email protected]> wrote:
> From: Konrad Beckmann <[email protected]>
>
> A specially crafted FIT image leads to memory corruption in the stack
> when using the verified boot feature. The function fit_config_check_sig
> has a logic error that makes it possible to write past the end of the
> stack allocated array node_inc. This could potentially be used to bypass
> the signature check when using verified boot.
>
> This change ensures that the number of strings is correct when counted.
>
> Signed-off-by: Konrad Beckmann <[email protected]>
> ---
>  common/image-sig.c | 5 +++++
>  1 file changed, 5 insertions(+)

Reviewed-by: Simon Glass <[email protected]>
_______________________________________________
U-Boot mailing list
[email protected]
https://lists.denx.de/listinfo/u-boot

Reply via email to