diff options
author | Doug Flick via groups.io <dougflick=microsoft.com@groups.io> | 2024-01-26 05:54:45 +0800 |
---|---|---|
committer | mergify[bot] <37929162+mergify[bot]@users.noreply.github.com> | 2024-02-06 19:24:26 +0000 |
commit | 5f3658197bf29c83b3349b0ab1d99cdb0c3814bc (patch) | |
tree | d2131d329d0c248b0327c18b10917398a84e7411 /MdePkg/MdePkgExtra.uni | |
parent | 8014ac2d7bbbc503f5562b51af46bb20ae3d22ff (diff) | |
download | edk2-5f3658197bf29c83b3349b0ab1d99cdb0c3814bc.tar.gz edk2-5f3658197bf29c83b3349b0ab1d99cdb0c3814bc.tar.bz2 edk2-5f3658197bf29c83b3349b0ab1d99cdb0c3814bc.zip |
NetworkPkg: Dhcp6Dxe: SECURITY PATCH CVE-2023-45230 Unit Tests
REF: https://bugzilla.tianocore.org/show_bug.cgi?id=4535
Confirms that reported issue...
"Buffer overflow in the DHCPv6 client via a long Server ID option"
..has been corrected by the provided patch.
Tests the following functions to ensure they appropriately handle
untrusted data (either too long or too small) to prevent a buffer
overflow:
Dhcp6AppendOption
Dhcp6AppendETOption
Dhcp6AppendIaOption
Cc: Saloni Kasbekar <saloni.kasbekar@intel.com>
Cc: Zachary Clark-williams <zachary.clark-williams@intel.com>
Signed-off-by: Doug Flick [MSFT] <doug.edk2@gmail.com>
Reviewed-by: Saloni Kasbekar <saloni.kasbekar@intel.com>
Diffstat (limited to 'MdePkg/MdePkgExtra.uni')
0 files changed, 0 insertions, 0 deletions