From nobody Fri Dec 19 18:44:23 2025 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) client-ip=66.175.222.108; envelope-from=bounce+27952+113577+1787277+3901457@groups.io; helo=mail02.groups.io; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce+27952+113577+1787277+3901457@groups.io; dmarc=fail(p=none dis=none) header.from=intel.com ARC-Seal: i=1; a=rsa-sha256; t=1704950133; cv=none; d=zohomail.com; s=zohoarc; b=CVWFxL4O1XFex+egr6skgPnsGlD7NmKvBZZXuEQv1dj3c/jLDv2/Mtp+37nZ5HBTQFIekiwmc4QXTPTK+g6Bfj67EjRFicwe9HY6yDkU+6ZBb5smsIQXzDyaW6bxPlH6gz5Ph5YW8LELD22Zg2GVJAvUIIrcby/JUlKX8oalTd4= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1704950133; h=Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:Reply-To:Reply-To:References:Sender:Subject:Subject:To:To:Message-Id; bh=5zd2l1O3xDiP2KMu/rO7Vc35KTTdhP7funUUCKRNNJU=; b=RFnNWyssIH97HwO+eqI2Uy1fy/sKDXomipEmvLNMcP/LTVui1XqfITOAOm9tbvNd5NgFmEj15HBnHzzfy6aLleGgZKnhXGeqEniOXO0fPJv6sMRPOv6j8an717O9gxmt8Y9ioZObu2ML35zUJIm0Nu1Hb3gZjfiK/4wfOQzdYM4= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce+27952+113577+1787277+3901457@groups.io; dmarc=fail header.from= (p=none dis=none) Received: from mail02.groups.io (mail02.groups.io [66.175.222.108]) by mx.zohomail.com with SMTPS id 170495013306825.459694683493694; Wed, 10 Jan 2024 21:15:33 -0800 (PST) Return-Path: DKIM-Signature: a=rsa-sha256; bh=dSSMXxl3JNH17WsqxEhqiNhUbhn+xi8gXvJFkVfOd3E=; c=relaxed/simple; d=groups.io; h=From:To:Cc:Subject:Date:Message-Id:In-Reply-To:References:MIME-Version:Precedence:List-Subscribe:List-Help:Sender:List-Id:Mailing-List:Delivered-To:Reply-To:List-Unsubscribe-Post:List-Unsubscribe:Content-Transfer-Encoding; s=20140610; t=1704950132; v=1; b=NGXcPRBX0sToJUYdHcq3ce/MDq21C++mGLSBSQRe4/S4WiSli+2aqQQqrJCNdSVs/zj3wsuN +eYACwDwbfPTBJi/qulPe0qpNHoJVmK2ALjhYP68R5/IK8H6gKWAE47Ct+wzGcyYlFF6F0pecRm sIuB+x2SulzRZhYU/IvW2I4o= X-Received: by 127.0.0.2 with SMTP id rUnKYY1788612xN2Q8Rx9LGG; Wed, 10 Jan 2024 21:15:32 -0800 X-Received: from mgamail.intel.com (mgamail.intel.com [192.198.163.8]) by mx.groups.io with SMTP id smtpd.web10.5391.1704950130183224811 for ; Wed, 10 Jan 2024 21:15:32 -0800 X-IronPort-AV: E=McAfee;i="6600,9927,10949"; a="12229104" X-IronPort-AV: E=Sophos;i="6.04,185,1695711600"; d="scan'208";a="12229104" X-Received: from orsmga005.jf.intel.com ([10.7.209.41]) by fmvoesa102.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 10 Jan 2024 21:15:31 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6600,9927,10949"; a="955624802" X-IronPort-AV: E=Sophos;i="6.04,185,1695711600"; d="scan'208";a="955624802" X-Received: from gguo-desk.gar.corp.intel.com ([10.225.76.26]) by orsmga005.jf.intel.com with ESMTP; 10 Jan 2024 21:15:29 -0800 From: "Guo, Gua" To: devel@edk2.groups.io Cc: gua.guo@intel.com, Gerd Hoffmann , Marc Beatove , Guo Dong , Sean Rhodes , James Lu , John Mathew Subject: [edk2-devel] [PATCH v1 1/4] UefiPayloadPkg/Hob: Integer Overflow in CreateHob() Date: Thu, 11 Jan 2024 13:15:18 +0800 Message-Id: <20240111051521.1366-2-gua.guo@intel.com> In-Reply-To: <20240111051521.1366-1-gua.guo@intel.com> References: <20240111051521.1366-1-gua.guo@intel.com> MIME-Version: 1.0 Precedence: Bulk List-Subscribe: List-Help: Sender: devel@edk2.groups.io List-Id: Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io Reply-To: devel@edk2.groups.io,gua.guo@intel.com List-Unsubscribe-Post: List-Unsubscribe=One-Click List-Unsubscribe: X-Gm-Message-State: jMtWpt29r7BXLYEYkW014jZ7x1787277AA= Content-Transfer-Encoding: quoted-printable X-ZohoMail-DKIM: pass (identity @groups.io) X-ZM-MESSAGEID: 1704950133872100005 Content-Type: text/plain; charset="utf-8" From: Gerd Hoffmann REF: https://bugzilla.tianocore.org/show_bug.cgi?id=3D4166 Fix integer overflow in various CreateHob instances. Fixes: CVE-2022-36765 The CreateHob() function aligns the requested size to 8 performing the following operation: ``` HobLength =3D (UINT16)((HobLength + 0x7) & (~0x7)); ``` No checks are performed to ensure this value doesn't overflow, and could lead to CreateHob() returning a smaller HOB than requested, which could lead to OOB HOB accesses. Reported-by: Marc Beatove Cc: Guo Dong Cc: Sean Rhodes Cc: James Lu Reviewed-by: Gua Guo Cc: John Mathew Signed-off-by: Gerd Hoffmann --- UefiPayloadPkg/Library/PayloadEntryHobLib/Hob.c | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/UefiPayloadPkg/Library/PayloadEntryHobLib/Hob.c b/UefiPayloadP= kg/Library/PayloadEntryHobLib/Hob.c index 2c3acbbc19..f2bd2650b6 100644 --- a/UefiPayloadPkg/Library/PayloadEntryHobLib/Hob.c +++ b/UefiPayloadPkg/Library/PayloadEntryHobLib/Hob.c @@ -110,6 +110,12 @@ CreateHob ( =20 HandOffHob =3D GetHobList (); =20 + // + // Check Length to avoid data overflow. + // + if (HobLength > MAX_UINT16 - 0x7) { + return NULL; + } HobLength =3D (UINT16)((HobLength + 0x7) & (~0x7)); =20 FreeMemory =3D HandOffHob->EfiFreeMemoryTop - HandOffHob->EfiFreeMemoryB= ottom; --=20 2.39.2.windows.1 -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#113577): https://edk2.groups.io/g/devel/message/113577 Mute This Topic: https://groups.io/mt/103657271/1787277 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [importer@patchew.org] -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-