diff options
author | Zhang, Chao B <chao.b.zhang@intel.com> | 2018-03-20 16:32:11 +0800 |
---|---|---|
committer | Zhang, Chao B <chao.b.zhang@intel.com> | 2018-04-09 22:32:45 +0800 |
commit | 1f20e7f8d01e68716820ca100a5ba2ca07a7275e (patch) | |
tree | c272622195eb1260263ef1daab0f06fa11705a45 /edksetup.sh | |
parent | 65fdb1e3740f576088852e41e970e7c5c5ccf87f (diff) | |
download | edk2-1f20e7f8d01e68716820ca100a5ba2ca07a7275e.tar.gz |
SecurityPkg Tpm2CommandLib: Fix TPM2.0 response memory overflow
TPM2.0 command lib always assumes TPM device and transmission channel can
respond correctly. But it is not true when communication channel is exploited
and wrong data is spoofed. Add more logic to prohibit memory overflow attack.
Cc: Long Qin <qin.long@intel.com>
Cc: Yao Jiewen <jiewen.yao@intel.com>
Contributed-under: TianoCore Contribution Agreement 1.1
Signed-off-by: Chao Zhang <chao.b.zhang@intel.com>
Reviewed-by: Long Qin <qin.long@intel.com>
Reviewed-by: Yao Jiewen <jiewen.yao@intel.com>
(cherry picked from commit dd577319e83d13a7ab46ffdccb6635281d2ca9e5)
Diffstat (limited to 'edksetup.sh')
0 files changed, 0 insertions, 0 deletions