First published: Tue Feb 26 2019(Updated: )
A flaw was found in edk2. When registering a Ram disk whose size is not a multiple of 512 bytes, the BlockIo protocol produced by the RamDiskDxe driver will incur memory read/write overrun. The memory overrun will happen when reading/writing the last block on the Ram disk. Upstream Bug: <a href="https://bugzilla.tianocore.org/show_bug.cgi?id=1134">https://bugzilla.tianocore.org/show_bug.cgi?id=1134</a> Upstream Patch: <a href="https://lists.01.org/pipermail/edk2-devel/2019-February/037248.html">https://lists.01.org/pipermail/edk2-devel/2019-February/037248.html</a> <a href="https://lists.01.org/pipermail/edk2-devel/2019-February/037249.html">https://lists.01.org/pipermail/edk2-devel/2019-February/037249.html</a> <a href="https://lists.01.org/pipermail/edk2-devel/2019-February/037250.html">https://lists.01.org/pipermail/edk2-devel/2019-February/037250.html</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Tianocore EDK II |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1683372 is considered high due to the potential for memory read/write overrun.
To fix REDHAT-BUG-1683372, ensure that Ram disks are registered with sizes that are multiples of 512 bytes.
REDHAT-BUG-1683372 can lead to serious data corruption or system instability caused by memory overruns.
The vulnerability REDHAT-BUG-1683372 affects the TianoCore EDK II software when handling improperly sized Ram disks.
Currently, the best workaround for REDHAT-BUG-1683372 is to avoid using Ram disks with sizes that are not multiples of 512 bytes.