UEFI Firmware Parser has a heap out-of-bounds write in tiano decompressor ReadCLen
Critical severity
GitHub Reviewed
Published
Apr 14, 2026
in
theopolis/uefi-firmware-parser
•
Updated Apr 16, 2026
Description
Published to the GitHub Advisory Database
Apr 16, 2026
Reviewed
Apr 16, 2026
Last updated
Apr 16, 2026
uefi-firmwarecontains a heap out-of-bounds write vulnerability in the native tiano/EFI decompressor. inuefi_firmware/compression/Tiano/Decompress.c,ReadCLen()readsNumber = GetBits(Sd, CBIT)withCBIT = 9, soNumbercan be as large as511, while the destination arraySd->mCLenhasNC = 510elements. the loop writes whileIndex < Numberwithout enforcingIndex < NC. additionally, theCharC == 2run-length path performsGetBits(Sd, 9) + 20, allowing up to531zero writes throughSd->mCLen[Index++] = 0.Reachability is through the normal parsing path:
CompressedSection.process()->efi_compressor.TianoDecompress()->TianoDecompress()->DecodeC()->ReadCLen().Minimum impact is a deterministic crash; depending on build/runtime details, the heap memory corruption may be exploitable for code execution in the context of the parsing process. this project shipped its own copy of the decompressor without the upstream EDK2 hardening for this bug class.
References