summaryrefslogtreecommitdiffstats
path: root/OvmfPkg/VirtioPciDeviceDxe
diff options
context:
space:
mode:
authorDoug Flick via groups.io <dougflick=microsoft.com@groups.io>2024-01-26 05:54:45 +0800
committermergify[bot] <37929162+mergify[bot]@users.noreply.github.com>2024-02-06 19:24:26 +0000
commit5f3658197bf29c83b3349b0ab1d99cdb0c3814bc (patch)
treed2131d329d0c248b0327c18b10917398a84e7411 /OvmfPkg/VirtioPciDeviceDxe
parent8014ac2d7bbbc503f5562b51af46bb20ae3d22ff (diff)
downloadedk2-5f3658197bf29c83b3349b0ab1d99cdb0c3814bc.tar.gz
edk2-5f3658197bf29c83b3349b0ab1d99cdb0c3814bc.tar.bz2
edk2-5f3658197bf29c83b3349b0ab1d99cdb0c3814bc.zip
NetworkPkg: Dhcp6Dxe: SECURITY PATCH CVE-2023-45230 Unit Tests
REF: https://bugzilla.tianocore.org/show_bug.cgi?id=4535 Confirms that reported issue... "Buffer overflow in the DHCPv6 client via a long Server ID option" ..has been corrected by the provided patch. Tests the following functions to ensure they appropriately handle untrusted data (either too long or too small) to prevent a buffer overflow: Dhcp6AppendOption Dhcp6AppendETOption Dhcp6AppendIaOption Cc: Saloni Kasbekar <saloni.kasbekar@intel.com> Cc: Zachary Clark-williams <zachary.clark-williams@intel.com> Signed-off-by: Doug Flick [MSFT] <doug.edk2@gmail.com> Reviewed-by: Saloni Kasbekar <saloni.kasbekar@intel.com>
Diffstat (limited to 'OvmfPkg/VirtioPciDeviceDxe')
0 files changed, 0 insertions, 0 deletions