From nobody Thu May 16 01:20:45 2024 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) client-ip=66.175.222.108; envelope-from=bounce+27952+113967+1787277+3901457@groups.io; helo=mail02.groups.io; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce+27952+113967+1787277+3901457@groups.io ARC-Seal: i=1; a=rsa-sha256; t=1705531654; cv=none; d=zohomail.com; s=zohoarc; b=Xqx2Ne2DKTFiskVs9q45+b+4Ac3doNwS7lFNsY2ePLzbJX0FszFt2jHFkNvhMSTsgIST/7oVpjlC5nFM1RM6Fa3Riw3AnA8tyw31/C8wGFIaULIHl+QN9ViVJ3Yv6Mg3VZAhQ4PcPZiVtLV3fbBh7FERZlmYEdYU322RFFx74+8= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1705531654; h=Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:Reply-To:Reply-To:References:Sender:Subject:Subject:To:To:Message-Id; bh=6HG9ueE9RB4Q8WaBTtwNfzq05CNOM1vqDI2vombLaEk=; b=KSmk5Vtv9LsOYdqwvTP5qBi+jxJJY4xLY4dXLp0/RCvRh0/YuIZzffBUxRr0XEqGNpjrtGZ7tvq0mGEf9Lm9LOouQn6QTKjjdv5fzDc8M/Zzf1IBgIwB3GF0eQsgIQUInBsxpAL3gJ9jUer7K9IuQkYbosq4C2/YZVU5nm98khE= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce+27952+113967+1787277+3901457@groups.io Received: from mail02.groups.io (mail02.groups.io [66.175.222.108]) by mx.zohomail.com with SMTPS id 170553165423491.66779415622796; Wed, 17 Jan 2024 14:47:34 -0800 (PST) Return-Path: DKIM-Signature: a=rsa-sha256; bh=UraK5nwMWhp9TXp+f5nrXdSWxd6PKcmcdNO270f0O7s=; c=relaxed/simple; d=groups.io; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References:MIME-Version:Precedence:List-Subscribe:List-Help:Sender:List-Id:Mailing-List:Delivered-To:Reply-To:List-Unsubscribe-Post:List-Unsubscribe:Content-Transfer-Encoding; s=20140610; t=1705531653; v=1; b=RIN+uD0rCogZ1sRlwuEZGq5KLo2zZBxpd361cg+ax5V2x/EhPZHFPf5QFYTfutXjOelEqsgA 1GxgLwVIjpJCmX12ai7981daUaBcdk7I0aqfJfANteVm5hNcFl1mPrCcOD6BDJPl9yCe++EHXu9 BnjXqG7snlc21t27r4Cyogsg= X-Received: by 127.0.0.2 with SMTP id 6Lt2YY1788612xNdK7qEUjaZ; Wed, 17 Jan 2024 14:47:33 -0800 X-Received: from mail-ot1-f43.google.com (mail-ot1-f43.google.com [209.85.210.43]) by mx.groups.io with SMTP id smtpd.web10.1546.1705531653257745874 for ; Wed, 17 Jan 2024 14:47:33 -0800 X-Received: by mail-ot1-f43.google.com with SMTP id 46e09a7af769-6ddee0aa208so5554744a34.3 for ; Wed, 17 Jan 2024 14:47:33 -0800 (PST) X-Gm-Message-State: bU4cpOyePI133ag2rgxYImlax1787277AA= X-Google-Smtp-Source: AGHT+IGC96gSyzq1VVcmghG1Kym6QEf7il8x4CbKxDXao4TkkcHQDKmeGKFw6PdQZxWtrvTQDKK+lg== X-Received: by 2002:a05:6358:429c:b0:175:93ed:b8e6 with SMTP id s28-20020a056358429c00b0017593edb8e6mr12538718rwc.52.1705531652285; Wed, 17 Jan 2024 14:47:32 -0800 (PST) X-Received: from localhost.localdomain ([131.107.1.227]) by smtp.gmail.com with ESMTPSA id h10-20020a65518a000000b0059d6f5196fasm139973pgq.78.2024.01.17.14.47.31 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 17 Jan 2024 14:47:31 -0800 (PST) From: "Doug Flick via groups.io" To: devel@edk2.groups.io Cc: "Douglas Flick [MSFT]" , Jiewen Yao , Rahul Kumar Subject: [edk2-devel] [PATCH 1/3] SecurityPkg: DxeTpm2MeasureBootLib: SECURITY PATCH 4117/4118 symbol rename Date: Wed, 17 Jan 2024 14:47:20 -0800 Message-ID: <7b18434c8a8b561654efd40ced3becb8b378c8f1.1705529990.git.doug.edk2@gmail.com> In-Reply-To: References: MIME-Version: 1.0 Precedence: Bulk List-Subscribe: List-Help: Sender: devel@edk2.groups.io List-Id: Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io Reply-To: devel@edk2.groups.io,dougflick@microsoft.com List-Unsubscribe-Post: List-Unsubscribe=One-Click List-Unsubscribe: Content-Transfer-Encoding: quoted-printable X-ZohoMail-DKIM: pass (identity @groups.io) X-ZM-MESSAGEID: 1705531655566100003 Content-Type: text/plain; charset="utf-8" Updates the sanitation function names to be lib unique names Cc: Jiewen Yao Cc: Rahul Kumar Signed-off-by: Doug Flick [MSFT] Reviewed-by: Jiewen Yao --- .../DxeTpm2MeasureBootLibSanitization.h | 8 +++--- .../DxeTpm2MeasureBootLib.c | 8 +++--- .../DxeTpm2MeasureBootLibSanitization.c | 8 +++--- .../DxeTpm2MeasureBootLibSanitizationTest.c | 26 +++++++++---------- 4 files changed, 25 insertions(+), 25 deletions(-) diff --git a/SecurityPkg/Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureBootLi= bSanitization.h b/SecurityPkg/Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureB= ootLibSanitization.h index 8f72ba42401f..8526bc7537d5 100644 --- a/SecurityPkg/Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureBootLibSaniti= zation.h +++ b/SecurityPkg/Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureBootLibSaniti= zation.h @@ -54,7 +54,7 @@ **/ EFI_STATUS EFIAPI -SanitizeEfiPartitionTableHeader ( +Tpm2SanitizeEfiPartitionTableHeader ( IN CONST EFI_PARTITION_TABLE_HEADER *PrimaryHeader, IN CONST EFI_BLOCK_IO_PROTOCOL *BlockIo ); @@ -78,7 +78,7 @@ SanitizeEfiPartitionTableHeader ( **/ EFI_STATUS EFIAPI -SanitizePrimaryHeaderAllocationSize ( +Tpm2SanitizePrimaryHeaderAllocationSize ( IN CONST EFI_PARTITION_TABLE_HEADER *PrimaryHeader, OUT UINT32 *AllocationSize ); @@ -107,7 +107,7 @@ SanitizePrimaryHeaderAllocationSize ( One of the passed parameters was invalid. **/ EFI_STATUS -SanitizePrimaryHeaderGptEventSize ( +Tpm2SanitizePrimaryHeaderGptEventSize ( IN CONST EFI_PARTITION_TABLE_HEADER *PrimaryHeader, IN UINTN NumberOfPartition, OUT UINT32 *EventSize @@ -131,7 +131,7 @@ SanitizePrimaryHeaderGptEventSize ( One of the passed parameters was invalid. **/ EFI_STATUS -SanitizePeImageEventSize ( +Tpm2SanitizePeImageEventSize ( IN UINT32 FilePathSize, OUT UINT32 *EventSize ); diff --git a/SecurityPkg/Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureBootLi= b.c b/SecurityPkg/Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureBootLib.c index 714cc8e03e80..73719f3b96ed 100644 --- a/SecurityPkg/Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureBootLib.c +++ b/SecurityPkg/Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureBootLib.c @@ -200,7 +200,7 @@ Tcg2MeasureGptTable ( BlockIo->Media->BlockSize, (UINT8 *)PrimaryHeader ); - if (EFI_ERROR (Status) || EFI_ERROR (SanitizeEfiPartitionTableHeader (Pr= imaryHeader, BlockIo))) { + if (EFI_ERROR (Status) || EFI_ERROR (Tpm2SanitizeEfiPartitionTableHeader= (PrimaryHeader, BlockIo))) { DEBUG ((DEBUG_ERROR, "Failed to read Partition Table Header or invalid= Partition Table Header!\n")); FreePool (PrimaryHeader); return EFI_DEVICE_ERROR; @@ -209,7 +209,7 @@ Tcg2MeasureGptTable ( // // Read the partition entry. // - Status =3D SanitizePrimaryHeaderAllocationSize (PrimaryHeader, &AllocSiz= e); + Status =3D Tpm2SanitizePrimaryHeaderAllocationSize (PrimaryHeader, &Allo= cSize); if (EFI_ERROR (Status)) { FreePool (PrimaryHeader); return EFI_BAD_BUFFER_SIZE; @@ -250,7 +250,7 @@ Tcg2MeasureGptTable ( // // Prepare Data for Measurement (CcProtocol and Tcg2Protocol) // - Status =3D SanitizePrimaryHeaderGptEventSize (PrimaryHeader, NumberOfPar= tition, &TcgEventSize); + Status =3D Tpm2SanitizePrimaryHeaderGptEventSize (PrimaryHeader, NumberO= fPartition, &TcgEventSize); if (EFI_ERROR (Status)) { FreePool (PrimaryHeader); FreePool (EntryPtr); @@ -420,7 +420,7 @@ Tcg2MeasurePeImage ( } =20 FilePathSize =3D (UINT32)GetDevicePathSize (FilePath); - Status =3D SanitizePeImageEventSize (FilePathSize, &EventSize); + Status =3D Tpm2SanitizePeImageEventSize (FilePathSize, &EventSize); if (EFI_ERROR (Status)) { return EFI_UNSUPPORTED; } diff --git a/SecurityPkg/Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureBootLi= bSanitization.c b/SecurityPkg/Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureB= ootLibSanitization.c index 2a4d52c6d5cf..809a3bfd892e 100644 --- a/SecurityPkg/Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureBootLibSaniti= zation.c +++ b/SecurityPkg/Library/DxeTpm2MeasureBootLib/DxeTpm2MeasureBootLibSaniti= zation.c @@ -63,7 +63,7 @@ **/ EFI_STATUS EFIAPI -SanitizeEfiPartitionTableHeader ( +Tpm2SanitizeEfiPartitionTableHeader ( IN CONST EFI_PARTITION_TABLE_HEADER *PrimaryHeader, IN CONST EFI_BLOCK_IO_PROTOCOL *BlockIo ) @@ -169,7 +169,7 @@ SanitizeEfiPartitionTableHeader ( **/ EFI_STATUS EFIAPI -SanitizePrimaryHeaderAllocationSize ( +Tpm2SanitizePrimaryHeaderAllocationSize ( IN CONST EFI_PARTITION_TABLE_HEADER *PrimaryHeader, OUT UINT32 *AllocationSize ) @@ -221,7 +221,7 @@ SanitizePrimaryHeaderAllocationSize ( One of the passed parameters was invalid. **/ EFI_STATUS -SanitizePrimaryHeaderGptEventSize ( +Tpm2SanitizePrimaryHeaderGptEventSize ( IN CONST EFI_PARTITION_TABLE_HEADER *PrimaryHeader, IN UINTN NumberOfPartition, OUT UINT32 *EventSize @@ -292,7 +292,7 @@ SanitizePrimaryHeaderGptEventSize ( One of the passed parameters was invalid. **/ EFI_STATUS -SanitizePeImageEventSize ( +Tpm2SanitizePeImageEventSize ( IN UINT32 FilePathSize, OUT UINT32 *EventSize ) diff --git a/SecurityPkg/Library/DxeTpm2MeasureBootLib/InternalUnitTest/Dxe= Tpm2MeasureBootLibSanitizationTest.c b/SecurityPkg/Library/DxeTpm2MeasureBo= otLib/InternalUnitTest/DxeTpm2MeasureBootLibSanitizationTest.c index 820e99aeb9b4..50a68e1076ad 100644 --- a/SecurityPkg/Library/DxeTpm2MeasureBootLib/InternalUnitTest/DxeTpm2Mea= sureBootLibSanitizationTest.c +++ b/SecurityPkg/Library/DxeTpm2MeasureBootLib/InternalUnitTest/DxeTpm2Mea= sureBootLibSanitizationTest.c @@ -84,27 +84,27 @@ TestSanitizeEfiPartitionTableHeader ( PrimaryHeader.Header.CRC32 =3D CalculateCrc32 ((UINT8 *)&PrimaryHeader, = PrimaryHeader.Header.HeaderSize); =20 // Test that a normal PrimaryHeader passes validation - Status =3D SanitizeEfiPartitionTableHeader (&PrimaryHeader, &BlockIo); + Status =3D Tpm2SanitizeEfiPartitionTableHeader (&PrimaryHeader, &BlockIo= ); UT_ASSERT_NOT_EFI_ERROR (Status); =20 // Test that when number of partition entries is 0, the function returns= EFI_DEVICE_ERROR // Should print "Invalid Partition Table Header NumberOfPartitionEntries= !"" PrimaryHeader.NumberOfPartitionEntries =3D 0; - Status =3D SanitizeEfiPartitionTableHead= er (&PrimaryHeader, &BlockIo); + Status =3D Tpm2SanitizeEfiPartitionTable= Header (&PrimaryHeader, &BlockIo); UT_ASSERT_EQUAL (Status, EFI_DEVICE_ERROR); PrimaryHeader.NumberOfPartitionEntries =3D DEFAULT_PRIMARY_TABLE_HEADER_= SIZE_OF_PARTITION_ENTRY; =20 // Test that when the header size is too small, the function returns EFI= _DEVICE_ERROR // Should print "Invalid Partition Table Header Size!" PrimaryHeader.Header.HeaderSize =3D 0; - Status =3D SanitizeEfiPartitionTableHeader (&Pr= imaryHeader, &BlockIo); + Status =3D Tpm2SanitizeEfiPartitionTableHeader = (&PrimaryHeader, &BlockIo); UT_ASSERT_EQUAL (Status, EFI_DEVICE_ERROR); PrimaryHeader.Header.HeaderSize =3D sizeof (EFI_PARTITION_TABLE_HEADER); =20 // Test that when the SizeOfPartitionEntry is too small, the function re= turns EFI_DEVICE_ERROR // should print: "SizeOfPartitionEntry shall be set to a value of 128 x = 2^n where n is an integer greater than or equal to zero (e.g., 128, 256, 51= 2, etc.)!" PrimaryHeader.SizeOfPartitionEntry =3D 1; - Status =3D SanitizeEfiPartitionTableHeader (= &PrimaryHeader, &BlockIo); + Status =3D Tpm2SanitizeEfiPartitionTableHead= er (&PrimaryHeader, &BlockIo); UT_ASSERT_EQUAL (Status, EFI_DEVICE_ERROR); =20 DEBUG ((DEBUG_INFO, "%a: Test passed\n", __func__)); @@ -137,7 +137,7 @@ TestSanitizePrimaryHeaderAllocationSize ( PrimaryHeader.NumberOfPartitionEntries =3D 5; PrimaryHeader.SizeOfPartitionEntry =3D DEFAULT_PRIMARY_TABLE_HEADER_= SIZE_OF_PARTITION_ENTRY; =20 - Status =3D SanitizePrimaryHeaderAllocationSize (&PrimaryHeader, &Allocat= ionSize); + Status =3D Tpm2SanitizePrimaryHeaderAllocationSize (&PrimaryHeader, &All= ocationSize); UT_ASSERT_NOT_EFI_ERROR (Status); =20 // Test that the allocation size is correct compared to the existing log= ic @@ -146,19 +146,19 @@ TestSanitizePrimaryHeaderAllocationSize ( // Test that an overflow is detected PrimaryHeader.NumberOfPartitionEntries =3D MAX_UINT32; PrimaryHeader.SizeOfPartitionEntry =3D 5; - Status =3D SanitizePrimaryHeaderAllocati= onSize (&PrimaryHeader, &AllocationSize); + Status =3D Tpm2SanitizePrimaryHeaderAllo= cationSize (&PrimaryHeader, &AllocationSize); UT_ASSERT_EQUAL (Status, EFI_BAD_BUFFER_SIZE); =20 // Test the inverse PrimaryHeader.NumberOfPartitionEntries =3D 5; PrimaryHeader.SizeOfPartitionEntry =3D MAX_UINT32; - Status =3D SanitizePrimaryHeaderAllocati= onSize (&PrimaryHeader, &AllocationSize); + Status =3D Tpm2SanitizePrimaryHeaderAllo= cationSize (&PrimaryHeader, &AllocationSize); UT_ASSERT_EQUAL (Status, EFI_BAD_BUFFER_SIZE); =20 // Test the worst case scenario PrimaryHeader.NumberOfPartitionEntries =3D MAX_UINT32; PrimaryHeader.SizeOfPartitionEntry =3D MAX_UINT32; - Status =3D SanitizePrimaryHeaderAllocati= onSize (&PrimaryHeader, &AllocationSize); + Status =3D Tpm2SanitizePrimaryHeaderAllo= cationSize (&PrimaryHeader, &AllocationSize); UT_ASSERT_EQUAL (Status, EFI_BAD_BUFFER_SIZE); =20 DEBUG ((DEBUG_INFO, "%a: Test passed\n", __func__)); @@ -196,7 +196,7 @@ TestSanitizePrimaryHeaderGptEventSize ( NumberOfPartition =3D 13; =20 // that the primary event size is correct - Status =3D SanitizePrimaryHeaderGptEventSize (&PrimaryHeader, NumberOfPa= rtition, &EventSize); + Status =3D Tpm2SanitizePrimaryHeaderGptEventSize (&PrimaryHeader, Number= OfPartition, &EventSize); UT_ASSERT_NOT_EFI_ERROR (Status); =20 // Calculate the existing logic event size @@ -207,12 +207,12 @@ TestSanitizePrimaryHeaderGptEventSize ( UT_ASSERT_EQUAL (EventSize, ExistingLogicEventSize); =20 // Tests that the primary event size may not overflow - Status =3D SanitizePrimaryHeaderGptEventSize (&PrimaryHeader, MAX_UINT32= , &EventSize); + Status =3D Tpm2SanitizePrimaryHeaderGptEventSize (&PrimaryHeader, MAX_UI= NT32, &EventSize); UT_ASSERT_EQUAL (Status, EFI_BAD_BUFFER_SIZE); =20 // Test that the size of partition entries may not overflow PrimaryHeader.SizeOfPartitionEntry =3D MAX_UINT32; - Status =3D SanitizePrimaryHeaderGptEventSize= (&PrimaryHeader, NumberOfPartition, &EventSize); + Status =3D Tpm2SanitizePrimaryHeaderGptEvent= Size (&PrimaryHeader, NumberOfPartition, &EventSize); UT_ASSERT_EQUAL (Status, EFI_BAD_BUFFER_SIZE); =20 DEBUG ((DEBUG_INFO, "%a: Test passed\n", __func__)); @@ -245,7 +245,7 @@ TestSanitizePeImageEventSize ( FilePathSize =3D 255; =20 // Test that a normal PE image passes validation - Status =3D SanitizePeImageEventSize (FilePathSize, &EventSize); + Status =3D Tpm2SanitizePeImageEventSize (FilePathSize, &EventSize); UT_ASSERT_EQUAL (Status, EFI_SUCCESS); =20 // Test that the event size is correct compared to the existing logic @@ -258,7 +258,7 @@ TestSanitizePeImageEventSize ( } =20 // Test that the event size may not overflow - Status =3D SanitizePeImageEventSize (MAX_UINT32, &EventSize); + Status =3D Tpm2SanitizePeImageEventSize (MAX_UINT32, &EventSize); UT_ASSERT_EQUAL (Status, EFI_BAD_BUFFER_SIZE); =20 DEBUG ((DEBUG_INFO, "%a: Test passed\n", __func__)); --=20 2.43.0 -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#113967): https://edk2.groups.io/g/devel/message/113967 Mute This Topic: https://groups.io/mt/103797462/1787277 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [importer@patchew.org] -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- From nobody Thu May 16 01:20:45 2024 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) client-ip=66.175.222.108; envelope-from=bounce+27952+113968+1787277+3901457@groups.io; helo=mail02.groups.io; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce+27952+113968+1787277+3901457@groups.io ARC-Seal: i=1; a=rsa-sha256; t=1705531654; cv=none; d=zohomail.com; s=zohoarc; b=LtA4Tc3jpFS8baJdKnefCQLQziZ1nYvJhWMqkwueCHlzk/JgJe06wQ1OUNQEttpwY6i91KcDONx01tSMykNcAbtN8goHUKcN/UhZv+ISgcAESpy9TIFRygX0uvB0l6s8PqWAwNZR4f5HsP+33xZ76XOkioOu1jLUh2ORWejGcDA= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1705531654; h=Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:Reply-To:Reply-To:References:Sender:Subject:Subject:To:To:Message-Id; bh=qA9NTCWAyRwG4/sGH5xRrxi22hZhQTyKrYQdteSu97c=; b=iaD7pWHWLvpqGbH5vFiP/DU2pYnKI2yb5+7YFP/tBMQ6C5qBZJrBtCz0P4CXENh9GSXdz2qoviVZzj9dup31Uc4gVGqgvxGiz5LguiKZzb62ae/UhFufiSJKBFLt2C35BR4UNuZaIvaeymA5CRo9HJjsY45QRT4JigfySUG+cxU= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce+27952+113968+1787277+3901457@groups.io Received: from mail02.groups.io (mail02.groups.io [66.175.222.108]) by mx.zohomail.com with SMTPS id 1705531654939504.1502960323172; Wed, 17 Jan 2024 14:47:34 -0800 (PST) Return-Path: DKIM-Signature: a=rsa-sha256; bh=1KpeXNuNgZyfFVyDICpKiYK/MQY0D0xUytskEG+A80M=; c=relaxed/simple; d=groups.io; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References:MIME-Version:Precedence:List-Subscribe:List-Help:Sender:List-Id:Mailing-List:Delivered-To:Reply-To:List-Unsubscribe-Post:List-Unsubscribe:Content-Transfer-Encoding; s=20140610; t=1705531654; v=1; b=lWIUMp/sFDQoBmHz/hzkuoh2WavpQTx7LX8ElV0n6cneUpikhBqPwQ4kU10+I7zH8RXel1F1 H70XJAjO65gZowBO2Qc6H/hxFJEtydStAoIK2/dqWhCYLLwvIA4kEUHh1T7XW8qhkNgJyxSrw0X JCNNo7AF4LKq5Etuo50iRLYY= X-Received: by 127.0.0.2 with SMTP id yWUMYY1788612xG5YdWHpjd2; Wed, 17 Jan 2024 14:47:34 -0800 X-Received: from mail-oo1-f46.google.com (mail-oo1-f46.google.com [209.85.161.46]) by mx.groups.io with SMTP id smtpd.web11.1521.1705531653945424199 for ; Wed, 17 Jan 2024 14:47:34 -0800 X-Received: by mail-oo1-f46.google.com with SMTP id 006d021491bc7-598bcccca79so3398435eaf.2 for ; Wed, 17 Jan 2024 14:47:33 -0800 (PST) X-Gm-Message-State: 6QkUstC1u4LBU9O57QklxVwlx1787277AA= X-Google-Smtp-Source: AGHT+IG/cI17TvU4WqltBnk6vF+LNos925gap2suC7cM9BwJXO84PPBNpz90MELxhY8a0oGG/Yy3eA== X-Received: by 2002:a05:6359:7393:b0:175:a7e5:361d with SMTP id uz19-20020a056359739300b00175a7e5361dmr5251215rwb.36.1705531653037; Wed, 17 Jan 2024 14:47:33 -0800 (PST) X-Received: from localhost.localdomain ([131.107.1.227]) by smtp.gmail.com with ESMTPSA id h10-20020a65518a000000b0059d6f5196fasm139973pgq.78.2024.01.17.14.47.32 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 17 Jan 2024 14:47:32 -0800 (PST) From: "Doug Flick via groups.io" To: devel@edk2.groups.io Cc: "Douglas Flick [MSFT]" , Jiewen Yao , Rahul Kumar Subject: [edk2-devel] [PATCH 2/3] SecurityPkg: DxeTpmMeasureBootLib: SECURITY PATCH 4117/4118 symbol rename Date: Wed, 17 Jan 2024 14:47:21 -0800 Message-ID: <355aa846a99ca6ac0f7574cf5982661da0d9fea6.1705529990.git.doug.edk2@gmail.com> In-Reply-To: References: MIME-Version: 1.0 Precedence: Bulk List-Subscribe: List-Help: Sender: devel@edk2.groups.io List-Id: Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io Reply-To: devel@edk2.groups.io,dougflick@microsoft.com List-Unsubscribe-Post: List-Unsubscribe=One-Click List-Unsubscribe: Content-Transfer-Encoding: quoted-printable X-ZohoMail-DKIM: pass (identity @groups.io) X-ZM-MESSAGEID: 1705531655657100007 Content-Type: text/plain; charset="utf-8" Updates the sanitation function names to be lib unique names Cc: Jiewen Yao Cc: Rahul Kumar Signed-off-by: Doug Flick [MSFT] Reviewed-by: Jiewen Yao --- .../DxeTpmMeasureBootLibSanitization.h | 8 +++--- .../DxeTpmMeasureBootLib.c | 8 +++--- .../DxeTpmMeasureBootLibSanitization.c | 10 +++---- .../DxeTpmMeasureBootLibSanitizationTest.c | 26 +++++++++---------- 4 files changed, 26 insertions(+), 26 deletions(-) diff --git a/SecurityPkg/Library/DxeTpmMeasureBootLib/DxeTpmMeasureBootLibS= anitization.h b/SecurityPkg/Library/DxeTpmMeasureBootLib/DxeTpmMeasureBootL= ibSanitization.h index 2248495813b5..db6e9c3752d6 100644 --- a/SecurityPkg/Library/DxeTpmMeasureBootLib/DxeTpmMeasureBootLibSanitiza= tion.h +++ b/SecurityPkg/Library/DxeTpmMeasureBootLib/DxeTpmMeasureBootLibSanitiza= tion.h @@ -53,7 +53,7 @@ **/ EFI_STATUS EFIAPI -SanitizeEfiPartitionTableHeader ( +TpmSanitizeEfiPartitionTableHeader ( IN CONST EFI_PARTITION_TABLE_HEADER *PrimaryHeader, IN CONST EFI_BLOCK_IO_PROTOCOL *BlockIo ); @@ -77,7 +77,7 @@ SanitizeEfiPartitionTableHeader ( **/ EFI_STATUS EFIAPI -SanitizePrimaryHeaderAllocationSize ( +TpmSanitizePrimaryHeaderAllocationSize ( IN CONST EFI_PARTITION_TABLE_HEADER *PrimaryHeader, OUT UINT32 *AllocationSize ); @@ -105,7 +105,7 @@ SanitizePrimaryHeaderAllocationSize ( One of the passed parameters was invalid. **/ EFI_STATUS -SanitizePrimaryHeaderGptEventSize ( +TpmSanitizePrimaryHeaderGptEventSize ( IN CONST EFI_PARTITION_TABLE_HEADER *PrimaryHeader, IN UINTN NumberOfPartition, OUT UINT32 *EventSize @@ -129,7 +129,7 @@ SanitizePrimaryHeaderGptEventSize ( One of the passed parameters was invalid. **/ EFI_STATUS -SanitizePeImageEventSize ( +TpmSanitizePeImageEventSize ( IN UINT32 FilePathSize, OUT UINT32 *EventSize ); diff --git a/SecurityPkg/Library/DxeTpmMeasureBootLib/DxeTpmMeasureBootLib.= c b/SecurityPkg/Library/DxeTpmMeasureBootLib/DxeTpmMeasureBootLib.c index a9fc440a091e..ac855b8fbbf4 100644 --- a/SecurityPkg/Library/DxeTpmMeasureBootLib/DxeTpmMeasureBootLib.c +++ b/SecurityPkg/Library/DxeTpmMeasureBootLib/DxeTpmMeasureBootLib.c @@ -174,7 +174,7 @@ TcgMeasureGptTable ( BlockIo->Media->BlockSize, (UINT8 *)PrimaryHeader ); - if (EFI_ERROR (Status) || EFI_ERROR (SanitizeEfiPartitionTableHeader (Pr= imaryHeader, BlockIo))) { + if (EFI_ERROR (Status) || EFI_ERROR (TpmSanitizeEfiPartitionTableHeader = (PrimaryHeader, BlockIo))) { DEBUG ((DEBUG_ERROR, "Failed to read Partition Table Header or invalid= Partition Table Header!\n")); FreePool (PrimaryHeader); return EFI_DEVICE_ERROR; @@ -183,7 +183,7 @@ TcgMeasureGptTable ( // // Read the partition entry. // - Status =3D SanitizePrimaryHeaderAllocationSize (PrimaryHeader, &AllocSiz= e); + Status =3D TpmSanitizePrimaryHeaderAllocationSize (PrimaryHeader, &Alloc= Size); if (EFI_ERROR (Status)) { FreePool (PrimaryHeader); return EFI_DEVICE_ERROR; @@ -224,7 +224,7 @@ TcgMeasureGptTable ( // // Prepare Data for Measurement // - Status =3D SanitizePrimaryHeaderGptEventSize (PrimaryHeader, NumberOfP= artition, &EventSize); + Status =3D TpmSanitizePrimaryHeaderGptEventSize (PrimaryHeader, Number= OfPartition, &EventSize); TcgEvent =3D (TCG_PCR_EVENT *)AllocateZeroPool (EventSize); if (TcgEvent =3D=3D NULL) { FreePool (PrimaryHeader); @@ -351,7 +351,7 @@ TcgMeasurePeImage ( =20 // Determine destination PCR by BootPolicy // - Status =3D SanitizePeImageEventSize (FilePathSize, &EventSize); + Status =3D TpmSanitizePeImageEventSize (FilePathSize, &EventSize); if (EFI_ERROR (Status)) { return EFI_UNSUPPORTED; } diff --git a/SecurityPkg/Library/DxeTpmMeasureBootLib/DxeTpmMeasureBootLibS= anitization.c b/SecurityPkg/Library/DxeTpmMeasureBootLib/DxeTpmMeasureBootL= ibSanitization.c index c989851cec2d..070e4a2c1cab 100644 --- a/SecurityPkg/Library/DxeTpmMeasureBootLib/DxeTpmMeasureBootLibSanitiza= tion.c +++ b/SecurityPkg/Library/DxeTpmMeasureBootLib/DxeTpmMeasureBootLibSanitiza= tion.c @@ -1,5 +1,5 @@ /** @file - The library instance provides security service of TPM2 measure boot and + The library instance provides security service of TPM measure boot and Confidential Computing (CC) measure boot. =20 Caution: This file requires additional review when modified. @@ -63,7 +63,7 @@ **/ EFI_STATUS EFIAPI -SanitizeEfiPartitionTableHeader ( +TpmSanitizeEfiPartitionTableHeader ( IN CONST EFI_PARTITION_TABLE_HEADER *PrimaryHeader, IN CONST EFI_BLOCK_IO_PROTOCOL *BlockIo ) @@ -145,7 +145,7 @@ SanitizeEfiPartitionTableHeader ( **/ EFI_STATUS EFIAPI -SanitizePrimaryHeaderAllocationSize ( +TpmSanitizePrimaryHeaderAllocationSize ( IN CONST EFI_PARTITION_TABLE_HEADER *PrimaryHeader, OUT UINT32 *AllocationSize ) @@ -194,7 +194,7 @@ SanitizePrimaryHeaderAllocationSize ( One of the passed parameters was invalid. **/ EFI_STATUS -SanitizePrimaryHeaderGptEventSize ( +TpmSanitizePrimaryHeaderGptEventSize ( IN CONST EFI_PARTITION_TABLE_HEADER *PrimaryHeader, IN UINTN NumberOfPartition, OUT UINT32 *EventSize @@ -258,7 +258,7 @@ SanitizePrimaryHeaderGptEventSize ( One of the passed parameters was invalid. **/ EFI_STATUS -SanitizePeImageEventSize ( +TpmSanitizePeImageEventSize ( IN UINT32 FilePathSize, OUT UINT32 *EventSize ) diff --git a/SecurityPkg/Library/DxeTpmMeasureBootLib/InternalUnitTest/DxeT= pmMeasureBootLibSanitizationTest.c b/SecurityPkg/Library/DxeTpmMeasureBootL= ib/InternalUnitTest/DxeTpmMeasureBootLibSanitizationTest.c index c41498be4521..de1740af41b3 100644 --- a/SecurityPkg/Library/DxeTpmMeasureBootLib/InternalUnitTest/DxeTpmMeasu= reBootLibSanitizationTest.c +++ b/SecurityPkg/Library/DxeTpmMeasureBootLib/InternalUnitTest/DxeTpmMeasu= reBootLibSanitizationTest.c @@ -83,27 +83,27 @@ TestSanitizeEfiPartitionTableHeader ( PrimaryHeader.Header.CRC32 =3D CalculateCrc32 ((UINT8 *)&PrimaryHeader, = PrimaryHeader.Header.HeaderSize); =20 // Test that a normal PrimaryHeader passes validation - Status =3D SanitizeEfiPartitionTableHeader (&PrimaryHeader, &BlockIo); + Status =3D TpmSanitizeEfiPartitionTableHeader (&PrimaryHeader, &BlockIo); UT_ASSERT_NOT_EFI_ERROR (Status); =20 // Test that when number of partition entries is 0, the function returns= EFI_DEVICE_ERROR // Should print "Invalid Partition Table Header NumberOfPartitionEntries= !"" PrimaryHeader.NumberOfPartitionEntries =3D 0; - Status =3D SanitizeEfiPartitionTableHead= er (&PrimaryHeader, &BlockIo); + Status =3D TpmSanitizeEfiPartitionTableH= eader (&PrimaryHeader, &BlockIo); UT_ASSERT_EQUAL (Status, EFI_DEVICE_ERROR); PrimaryHeader.NumberOfPartitionEntries =3D DEFAULT_PRIMARY_TABLE_HEADER_= SIZE_OF_PARTITION_ENTRY; =20 // Test that when the header size is too small, the function returns EFI= _DEVICE_ERROR // Should print "Invalid Partition Table Header Size!" PrimaryHeader.Header.HeaderSize =3D 0; - Status =3D SanitizeEfiPartitionTableHeader (&Pr= imaryHeader, &BlockIo); + Status =3D TpmSanitizeEfiPartitionTableHeader (= &PrimaryHeader, &BlockIo); UT_ASSERT_EQUAL (Status, EFI_DEVICE_ERROR); PrimaryHeader.Header.HeaderSize =3D sizeof (EFI_PARTITION_TABLE_HEADER); =20 // Test that when the SizeOfPartitionEntry is too small, the function re= turns EFI_DEVICE_ERROR // should print: "SizeOfPartitionEntry shall be set to a value of 128 x = 2^n where n is an integer greater than or equal to zero (e.g., 128, 256, 51= 2, etc.)!" PrimaryHeader.SizeOfPartitionEntry =3D 1; - Status =3D SanitizeEfiPartitionTableHeader (= &PrimaryHeader, &BlockIo); + Status =3D TpmSanitizeEfiPartitionTableHeade= r (&PrimaryHeader, &BlockIo); UT_ASSERT_EQUAL (Status, EFI_DEVICE_ERROR); =20 DEBUG ((DEBUG_INFO, "%a: Test passed\n", __func__)); @@ -136,7 +136,7 @@ TestSanitizePrimaryHeaderAllocationSize ( PrimaryHeader.NumberOfPartitionEntries =3D 5; PrimaryHeader.SizeOfPartitionEntry =3D DEFAULT_PRIMARY_TABLE_HEADER_= SIZE_OF_PARTITION_ENTRY; =20 - Status =3D SanitizePrimaryHeaderAllocationSize (&PrimaryHeader, &Allocat= ionSize); + Status =3D TpmSanitizePrimaryHeaderAllocationSize (&PrimaryHeader, &Allo= cationSize); UT_ASSERT_NOT_EFI_ERROR (Status); =20 // Test that the allocation size is correct compared to the existing log= ic @@ -145,19 +145,19 @@ TestSanitizePrimaryHeaderAllocationSize ( // Test that an overflow is detected PrimaryHeader.NumberOfPartitionEntries =3D MAX_UINT32; PrimaryHeader.SizeOfPartitionEntry =3D 5; - Status =3D SanitizePrimaryHeaderAllocati= onSize (&PrimaryHeader, &AllocationSize); + Status =3D TpmSanitizePrimaryHeaderAlloc= ationSize (&PrimaryHeader, &AllocationSize); UT_ASSERT_EQUAL (Status, EFI_BAD_BUFFER_SIZE); =20 // Test the inverse PrimaryHeader.NumberOfPartitionEntries =3D 5; PrimaryHeader.SizeOfPartitionEntry =3D MAX_UINT32; - Status =3D SanitizePrimaryHeaderAllocati= onSize (&PrimaryHeader, &AllocationSize); + Status =3D TpmSanitizePrimaryHeaderAlloc= ationSize (&PrimaryHeader, &AllocationSize); UT_ASSERT_EQUAL (Status, EFI_BAD_BUFFER_SIZE); =20 // Test the worst case scenario PrimaryHeader.NumberOfPartitionEntries =3D MAX_UINT32; PrimaryHeader.SizeOfPartitionEntry =3D MAX_UINT32; - Status =3D SanitizePrimaryHeaderAllocati= onSize (&PrimaryHeader, &AllocationSize); + Status =3D TpmSanitizePrimaryHeaderAlloc= ationSize (&PrimaryHeader, &AllocationSize); UT_ASSERT_EQUAL (Status, EFI_BAD_BUFFER_SIZE); =20 DEBUG ((DEBUG_INFO, "%a: Test passed\n", __func__)); @@ -195,7 +195,7 @@ TestSanitizePrimaryHeaderGptEventSize ( NumberOfPartition =3D 13; =20 // that the primary event size is correct - Status =3D SanitizePrimaryHeaderGptEventSize (&PrimaryHeader, NumberOfPa= rtition, &EventSize); + Status =3D TpmSanitizePrimaryHeaderGptEventSize (&PrimaryHeader, NumberO= fPartition, &EventSize); UT_ASSERT_NOT_EFI_ERROR (Status); =20 // Calculate the existing logic event size @@ -206,12 +206,12 @@ TestSanitizePrimaryHeaderGptEventSize ( UT_ASSERT_EQUAL (EventSize, ExistingLogicEventSize); =20 // Tests that the primary event size may not overflow - Status =3D SanitizePrimaryHeaderGptEventSize (&PrimaryHeader, MAX_UINT32= , &EventSize); + Status =3D TpmSanitizePrimaryHeaderGptEventSize (&PrimaryHeader, MAX_UIN= T32, &EventSize); UT_ASSERT_EQUAL (Status, EFI_BAD_BUFFER_SIZE); =20 // Test that the size of partition entries may not overflow PrimaryHeader.SizeOfPartitionEntry =3D MAX_UINT32; - Status =3D SanitizePrimaryHeaderGptEventSize= (&PrimaryHeader, NumberOfPartition, &EventSize); + Status =3D TpmSanitizePrimaryHeaderGptEventS= ize (&PrimaryHeader, NumberOfPartition, &EventSize); UT_ASSERT_EQUAL (Status, EFI_BAD_BUFFER_SIZE); =20 DEBUG ((DEBUG_INFO, "%a: Test passed\n", __func__)); @@ -269,7 +269,7 @@ TestSanitizePeImageEventSize ( FilePathSize =3D 255; =20 // Test that a normal PE image passes validation - Status =3D SanitizePeImageEventSize (FilePathSize, &EventSize); + Status =3D TpmSanitizePeImageEventSize (FilePathSize, &EventSize); if (EFI_ERROR (Status)) { UT_LOG_ERROR ("SanitizePeImageEventSize failed with %r\n", Status); goto Exit; @@ -285,7 +285,7 @@ TestSanitizePeImageEventSize ( } =20 // Test that the event size may not overflow - Status =3D SanitizePeImageEventSize (MAX_UINT32, &EventSize); + Status =3D TpmSanitizePeImageEventSize (MAX_UINT32, &EventSize); if (Status !=3D EFI_BAD_BUFFER_SIZE) { UT_LOG_ERROR ("SanitizePeImageEventSize succeded when it was supposed = to fail with %r\n", Status); goto Exit; --=20 2.43.0 -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#113968): https://edk2.groups.io/g/devel/message/113968 Mute This Topic: https://groups.io/mt/103797463/1787277 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [importer@patchew.org] -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- From nobody Thu May 16 01:20:45 2024 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) client-ip=66.175.222.108; envelope-from=bounce+27952+113969+1787277+3901457@groups.io; helo=mail02.groups.io; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce+27952+113969+1787277+3901457@groups.io ARC-Seal: i=1; a=rsa-sha256; t=1705531655; cv=none; d=zohomail.com; s=zohoarc; b=F0f/SADM+8Vb+CypExyDcnFg+hjeb5sNWZgCEx6X8iPTsYXeeh8MDLT6Kcx5RidcZCzDknABf4mlmPnzYYgWJZCQ+hvgwonViCME9qQrmafbKR05CBiemCBL3VfpE2JJzFIakvhUMQQHrAovlk6z1xRF4Dfu7y8JvLF9jIusNQ0= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1705531655; h=Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:Reply-To:Reply-To:References:Sender:Subject:Subject:To:To:Message-Id; bh=DMuZ5JqPbHXksRu/B34k3PyAZ+EToyQ/UddKWXUNH84=; b=GyUXEPloYJvk2262HdPhSMFWvL0xJHwoe6rZD2qIBJxq6qD5vF6ddHK6Rvf6kebUj2X5e0QbHz06ZTQKp92uVv4XzChMp2ISVIXVgHS7rtXLSHLQnVBvdBuGb76VlF+0aL3GSB8rB9A4NlxiHq5upK1HlxbtxMYPz5a+R8sjLfs= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of groups.io designates 66.175.222.108 as permitted sender) smtp.mailfrom=bounce+27952+113969+1787277+3901457@groups.io Received: from mail02.groups.io (mail02.groups.io [66.175.222.108]) by mx.zohomail.com with SMTPS id 170553165551595.95201980693571; Wed, 17 Jan 2024 14:47:35 -0800 (PST) Return-Path: DKIM-Signature: a=rsa-sha256; bh=Hy+dNlH9le35OTA5oxYV70Iooc/L21P619ZITbJm8kM=; c=relaxed/simple; d=groups.io; h=From:To:Cc:Subject:Date:Message-ID:In-Reply-To:References:MIME-Version:Precedence:List-Subscribe:List-Help:Sender:List-Id:Mailing-List:Delivered-To:Reply-To:List-Unsubscribe-Post:List-Unsubscribe:Content-Transfer-Encoding; s=20140610; t=1705531655; v=1; b=t8cRbJFvbPrgHqqE2h4WHx+G+P1SFh+AYC27FPrdHf+Mv1wsnoiC/MB17dW5Yq1sL09ZmMUT YhaPVoVhS8UR1bUnbzsvkr++wVO7aQKJ1jdUTIQBHogydR4rTZer8E7vgys37ByipgQAOcGSNsY rc5pfM1ZNmv40MH11SmYSnHY= X-Received: by 127.0.0.2 with SMTP id 1CvCYY1788612xIzw85JU7ib; Wed, 17 Jan 2024 14:47:35 -0800 X-Received: from mail-ot1-f41.google.com (mail-ot1-f41.google.com [209.85.210.41]) by mx.groups.io with SMTP id smtpd.web10.1547.1705531654512698932 for ; Wed, 17 Jan 2024 14:47:34 -0800 X-Received: by mail-ot1-f41.google.com with SMTP id 46e09a7af769-6dde528dbe8so5451250a34.0 for ; Wed, 17 Jan 2024 14:47:34 -0800 (PST) X-Gm-Message-State: bw05ifhhGNDGOZkxvENLn9rpx1787277AA= X-Google-Smtp-Source: AGHT+IGonmVOI/1fDrn4smyZMqY9+IcBnoc2zcOoBjSQ7YYB4Vzyq9H0Pv0QQzZ8OaTcOB/MvBqJdQ== X-Received: by 2002:a05:6870:d14c:b0:210:a2dc:772a with SMTP id f12-20020a056870d14c00b00210a2dc772amr1734702oac.87.1705531653749; Wed, 17 Jan 2024 14:47:33 -0800 (PST) X-Received: from localhost.localdomain ([131.107.1.227]) by smtp.gmail.com with ESMTPSA id h10-20020a65518a000000b0059d6f5196fasm139973pgq.78.2024.01.17.14.47.33 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 17 Jan 2024 14:47:33 -0800 (PST) From: "Doug Flick via groups.io" To: devel@edk2.groups.io Cc: "Douglas Flick [MSFT]" , Jiewen Yao , Rahul Kumar Subject: [edk2-devel] [PATCH 3/3] SecurityPkg: : Updating SecurityFixes.yaml after symbol rename Date: Wed, 17 Jan 2024 14:47:22 -0800 Message-ID: <5e0e851e97459e183420178888d4fcdadc2f1ae1.1705529990.git.doug.edk2@gmail.com> In-Reply-To: References: MIME-Version: 1.0 Precedence: Bulk List-Subscribe: List-Help: Sender: devel@edk2.groups.io List-Id: Mailing-List: list devel@edk2.groups.io; contact devel+owner@edk2.groups.io Reply-To: devel@edk2.groups.io,dougflick@microsoft.com List-Unsubscribe-Post: List-Unsubscribe=One-Click List-Unsubscribe: Content-Transfer-Encoding: quoted-printable X-ZohoMail-DKIM: pass (identity @groups.io) X-ZM-MESSAGEID: 1705531657465100015 Content-Type: text/plain; charset="utf-8" Adding the new commit titles for the symbol renames Cc: Jiewen Yao Cc: Rahul Kumar Signed-off-by: Doug Flick [MSFT] Reviewed-by: Jiewen Yao --- SecurityPkg/SecurityFixes.yaml | 28 +++++++++++++++++----------- 1 file changed, 17 insertions(+), 11 deletions(-) diff --git a/SecurityPkg/SecurityFixes.yaml b/SecurityPkg/SecurityFixes.yaml index 833fb827a96c..b4006b42b89e 100644 --- a/SecurityPkg/SecurityFixes.yaml +++ b/SecurityPkg/SecurityFixes.yaml @@ -9,28 +9,34 @@ CVE_2022_36763: - "SecurityPkg: DxeTpm2Measurement: SECURITY PATCH 4117 - CVE 2022-367= 63" - "SecurityPkg: DxeTpmMeasurement: SECURITY PATCH 4117 - CVE 2022-3676= 3" - "SecurityPkg: : Adding CVE 2022-36763 to SecurityFixes.yaml" + - "SecurityPkg: DxeTpm2MeasureBootLib: SECURITY PATCH 4117/4118 symbol= rename" + - "SecurityPkg: DxeTpmMeasureBootLib: SECURITY PATCH 4117/4118 symbol = rename" + - "SecurityPkg: : Updating SecurityFixes.yaml after symbol rename" cve: CVE-2022-36763 date_reported: 2022-10-25 11:31 UTC description: (CVE-2022-36763) - Heap Buffer Overflow in Tcg2MeasureGptTa= ble() note: This patch is related to and supersedes TCBZ2168 files_impacted: - - Library\DxeTpm2MeasureBootLib\DxeTpm2MeasureBootLib.c - - Library\DxeTpmMeasureBootLib\DxeTpmMeasureBootLib.c + - Library\DxeTpm2MeasureBootLib\DxeTpm2MeasureBootLib.c + - Library\DxeTpmMeasureBootLib\DxeTpmMeasureBootLib.c links: - - https://bugzilla.tianocore.org/show_bug.cgi?id=3D4117 - - https://bugzilla.tianocore.org/show_bug.cgi?id=3D2168 - - https://bugzilla.tianocore.org/show_bug.cgi?id=3D1990 + - https://bugzilla.tianocore.org/show_bug.cgi?id=3D4117 + - https://bugzilla.tianocore.org/show_bug.cgi?id=3D2168 + - https://bugzilla.tianocore.org/show_bug.cgi?id=3D1990 CVE_2022_36764: commit_titles: - - "SecurityPkg: DxeTpm2MeasureBootLib: SECURITY PATCH 4118 - CVE 2022= -36764" - - "SecurityPkg: DxeTpmMeasureBootLib: SECURITY PATCH 4118 - CVE 2022-= 36764" - - "SecurityPkg: : Adding CVE 2022-36764 to SecurityFixes.yaml" + - "SecurityPkg: DxeTpm2MeasureBootLib: SECURITY PATCH 4118 - CVE 2022-= 36764" + - "SecurityPkg: DxeTpmMeasureBootLib: SECURITY PATCH 4118 - CVE 2022-3= 6764" + - "SecurityPkg: : Adding CVE 2022-36764 to SecurityFixes.yaml" + - "SecurityPkg: DxeTpm2MeasureBootLib: SECURITY PATCH 4117/4118 symbol= rename" + - "SecurityPkg: DxeTpmMeasureBootLib: SECURITY PATCH 4117/4118 symbol = rename" + - "SecurityPkg: : Updating SecurityFixes.yaml after symbol rename" cve: CVE-2022-36764 date_reported: 2022-10-25 12:23 UTC description: Heap Buffer Overflow in Tcg2MeasurePeImage() note: files_impacted: - - Library\DxeTpm2MeasureBootLib\DxeTpm2MeasureBootLib.c - - Library\DxeTpmMeasureBootLib\DxeTpmMeasureBootLib.c + - Library\DxeTpm2MeasureBootLib\DxeTpm2MeasureBootLib.c + - Library\DxeTpmMeasureBootLib\DxeTpmMeasureBootLib.c links: - - https://bugzilla.tianocore.org/show_bug.cgi?id=3D4118 + - https://bugzilla.tianocore.org/show_bug.cgi?id=3D4118 --=20 2.43.0 -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D- Groups.io Links: You receive all messages sent to this group. View/Reply Online (#113969): https://edk2.groups.io/g/devel/message/113969 Mute This Topic: https://groups.io/mt/103797466/1787277 Group Owner: devel+owner@edk2.groups.io Unsubscribe: https://edk2.groups.io/g/devel/unsub [importer@patchew.org] -=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-=3D-