diff options
author | Michael Kubacki <michael.kubacki@microsoft.com> | 2020-04-07 22:46:37 -0700 |
---|---|---|
committer | mergify[bot] <37929162+mergify[bot]@users.noreply.github.com> | 2020-04-17 17:34:33 +0000 |
commit | 1c761011340d830a2bf66128325a686ffff3f5e9 (patch) | |
tree | badd7255a0383c5cfe6a1c6b239b494ff2612d48 /NetworkPkg/TlsAuthConfigDxe | |
parent | df4f154da9cb193b8e539157d1ed1a851cf1488e (diff) | |
download | edk2-1c761011340d830a2bf66128325a686ffff3f5e9.tar.gz edk2-1c761011340d830a2bf66128325a686ffff3f5e9.tar.bz2 edk2-1c761011340d830a2bf66128325a686ffff3f5e9.zip |
NetworkPkg/Ip6Dxe: Validate source data record length
REF:https://bugzilla.tianocore.org/show_bug.cgi?id=2273
Ip6ConfigReadConfigData() reads configuration data from a UEFI variable
and copies the data to another buffer. This change checks that the
length
of the data record being copied does not exceed the size of the source
UEFI variable data buffer.
If the size is exceeded, this change follows existing logic to treat the
variable as corrupted and deletes the variable so it will be set again.
Cc: Siyuan Fu <siyuan.fu@intel.com>
Cc: Maciej Rabeda <maciej.rabeda@linux.intel.com>
Cc: Jiaxin Wu <jiaxin.wu@intel.com>
Signed-off-by: Michael Kubacki <michael.kubacki@microsoft.com>
Reviewed-by: Siyuan Fu <siyuan.fu@intel.com>
Reviewed-by: Maciej Rabeda <maciej.rabeda@linux.intel.com>
Diffstat (limited to 'NetworkPkg/TlsAuthConfigDxe')
0 files changed, 0 insertions, 0 deletions