summaryrefslogtreecommitdiff
path: root/EdkShellBinPkg/Bin/Ipf/Apps/mem.efi
diff options
context:
space:
mode:
authorqhuang8 <qhuang8@6f19259b-4bc3-4df7-8a09-765794883524>2010-01-27 14:49:47 +0000
committerqhuang8 <qhuang8@6f19259b-4bc3-4df7-8a09-765794883524>2010-01-27 14:49:47 +0000
commit6dec88649aefe8c302d32871adfe791407911788 (patch)
treecb30fb49d8df2abca11041e8439418d2b5567fc5 /EdkShellBinPkg/Bin/Ipf/Apps/mem.efi
parent90f1486c8ebc891e3c69fc98d8efa372b0c4806c (diff)
downloadedk2-platforms-6dec88649aefe8c302d32871adfe791407911788.tar.xz
Fix a security hole in shell binaries:
For gBS->LoadImage() if the return status is EFI_SECURITY_VIOLATION, the image handle may not be NULL. Shell environment should not have the assumption that the output ImageHandle must be NULL if the error status is returned by gBS->LoadImage(). git-svn-id: https://edk2.svn.sourceforge.net/svnroot/edk2/trunk/edk2@9838 6f19259b-4bc3-4df7-8a09-765794883524
Diffstat (limited to 'EdkShellBinPkg/Bin/Ipf/Apps/mem.efi')
-rw-r--r--EdkShellBinPkg/Bin/Ipf/Apps/mem.efibin80800 -> 80800 bytes
1 files changed, 0 insertions, 0 deletions
diff --git a/EdkShellBinPkg/Bin/Ipf/Apps/mem.efi b/EdkShellBinPkg/Bin/Ipf/Apps/mem.efi
index d2e5530605..0a8b0c86e4 100644
--- a/EdkShellBinPkg/Bin/Ipf/Apps/mem.efi
+++ b/EdkShellBinPkg/Bin/Ipf/Apps/mem.efi
Binary files differ