* [PATCH] SecurityPkg/Tpm2Help.c: Add boundary check for array @ 2019-12-06 1:49 Zhang, Shenglei 2019-12-06 2:04 ` Yao, Jiewen 2019-12-06 9:27 ` [edk2-devel] " Laszlo Ersek 0 siblings, 2 replies; 5+ messages in thread From: Zhang, Shenglei @ 2019-12-06 1:49 UTC (permalink / raw) To: devel; +Cc: Jiewen Yao, Jian J Wang, Chao Zhang Add 'Index < HASH_COUNT' to ensure things out of boundary of digests[] can not be visited. Cc: Jiewen Yao <jiewen.yao@intel.com> Cc: Jian J Wang <jian.j.wang@intel.com> Cc: Chao Zhang <chao.b.zhang@intel.com> Signed-off-by: Shenglei Zhang <shenglei.zhang@intel.com> --- SecurityPkg/Library/Tpm2CommandLib/Tpm2Help.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/SecurityPkg/Library/Tpm2CommandLib/Tpm2Help.c b/SecurityPkg/Library/Tpm2CommandLib/Tpm2Help.c index 36c240d1221c..a7d4e3ab5373 100644 --- a/SecurityPkg/Library/Tpm2CommandLib/Tpm2Help.c +++ b/SecurityPkg/Library/Tpm2CommandLib/Tpm2Help.c @@ -299,7 +299,7 @@ GetDigestListSize ( UINT32 TotalSize; TotalSize = sizeof(DigestList->count); - for (Index = 0; Index < DigestList->count; Index++) { + for (Index = 0; Index < DigestList->count, Index < HASH_COUNT; Index++) { DigestSize = GetHashSizeFromAlgo (DigestList->digests[Index].hashAlg); TotalSize += sizeof(DigestList->digests[Index].hashAlg) + DigestSize; } -- 2.18.0.windows.1 ^ permalink raw reply related [flat|nested] 5+ messages in thread
* Re: [PATCH] SecurityPkg/Tpm2Help.c: Add boundary check for array 2019-12-06 1:49 [PATCH] SecurityPkg/Tpm2Help.c: Add boundary check for array Zhang, Shenglei @ 2019-12-06 2:04 ` Yao, Jiewen 2019-12-16 6:57 ` Zhang, Shenglei 2019-12-06 9:27 ` [edk2-devel] " Laszlo Ersek 1 sibling, 1 reply; 5+ messages in thread From: Yao, Jiewen @ 2019-12-06 2:04 UTC (permalink / raw) To: Zhang, Shenglei, devel@edk2.groups.io; +Cc: Wang, Jian J, Zhang, Chao B Hi May I know where is the data from? Trusted region or non-trusted region? I am thinking if we need use ASSERT to avoid user mistake. But want to check the API input assumption at first... > -----Original Message----- > From: Zhang, Shenglei <shenglei.zhang@intel.com> > Sent: Friday, December 6, 2019 9:50 AM > To: devel@edk2.groups.io > Cc: Yao, Jiewen <jiewen.yao@intel.com>; Wang, Jian J <jian.j.wang@intel.com>; > Zhang, Chao B <chao.b.zhang@intel.com> > Subject: [PATCH] SecurityPkg/Tpm2Help.c: Add boundary check for array > > Add 'Index < HASH_COUNT' to ensure things out of boundary > of digests[] can not be visited. > > Cc: Jiewen Yao <jiewen.yao@intel.com> > Cc: Jian J Wang <jian.j.wang@intel.com> > Cc: Chao Zhang <chao.b.zhang@intel.com> > Signed-off-by: Shenglei Zhang <shenglei.zhang@intel.com> > --- > SecurityPkg/Library/Tpm2CommandLib/Tpm2Help.c | 2 +- > 1 file changed, 1 insertion(+), 1 deletion(-) > > diff --git a/SecurityPkg/Library/Tpm2CommandLib/Tpm2Help.c > b/SecurityPkg/Library/Tpm2CommandLib/Tpm2Help.c > index 36c240d1221c..a7d4e3ab5373 100644 > --- a/SecurityPkg/Library/Tpm2CommandLib/Tpm2Help.c > +++ b/SecurityPkg/Library/Tpm2CommandLib/Tpm2Help.c > @@ -299,7 +299,7 @@ GetDigestListSize ( > UINT32 TotalSize; > > TotalSize = sizeof(DigestList->count); > - for (Index = 0; Index < DigestList->count; Index++) { > + for (Index = 0; Index < DigestList->count, Index < HASH_COUNT; Index++) { > DigestSize = GetHashSizeFromAlgo (DigestList->digests[Index].hashAlg); > TotalSize += sizeof(DigestList->digests[Index].hashAlg) + DigestSize; > } > -- > 2.18.0.windows.1 ^ permalink raw reply [flat|nested] 5+ messages in thread
* Re: [PATCH] SecurityPkg/Tpm2Help.c: Add boundary check for array 2019-12-06 2:04 ` Yao, Jiewen @ 2019-12-16 6:57 ` Zhang, Shenglei 0 siblings, 0 replies; 5+ messages in thread From: Zhang, Shenglei @ 2019-12-16 6:57 UTC (permalink / raw) To: Yao, Jiewen, devel@edk2.groups.io; +Cc: Wang, Jian J, Zhang, Chao B > -----Original Message----- > From: Yao, Jiewen > Sent: Friday, December 6, 2019 10:04 AM > To: Zhang, Shenglei <shenglei.zhang@intel.com>; devel@edk2.groups.io > Cc: Wang, Jian J <jian.j.wang@intel.com>; Zhang, Chao B > <chao.b.zhang@intel.com> > Subject: RE: [PATCH] SecurityPkg/Tpm2Help.c: Add boundary check for array > > Hi > May I know where is the data from? Trusted region or non-trusted region? > > I am thinking if we need use ASSERT to avoid user mistake. > But want to check the API input assumption at first... Hi Jiewen, I don't think DigestList->count can be trusted. We can add Index < HASH_COUNT into the for(...) statement. Thanks, Shenglei > > > > > -----Original Message----- > > From: Zhang, Shenglei <shenglei.zhang@intel.com> > > Sent: Friday, December 6, 2019 9:50 AM > > To: devel@edk2.groups.io > > Cc: Yao, Jiewen <jiewen.yao@intel.com>; Wang, Jian J > <jian.j.wang@intel.com>; > > Zhang, Chao B <chao.b.zhang@intel.com> > > Subject: [PATCH] SecurityPkg/Tpm2Help.c: Add boundary check for array > > > > Add 'Index < HASH_COUNT' to ensure things out of boundary > > of digests[] can not be visited. > > > > Cc: Jiewen Yao <jiewen.yao@intel.com> > > Cc: Jian J Wang <jian.j.wang@intel.com> > > Cc: Chao Zhang <chao.b.zhang@intel.com> > > Signed-off-by: Shenglei Zhang <shenglei.zhang@intel.com> > > --- > > SecurityPkg/Library/Tpm2CommandLib/Tpm2Help.c | 2 +- > > 1 file changed, 1 insertion(+), 1 deletion(-) > > > > diff --git a/SecurityPkg/Library/Tpm2CommandLib/Tpm2Help.c > > b/SecurityPkg/Library/Tpm2CommandLib/Tpm2Help.c > > index 36c240d1221c..a7d4e3ab5373 100644 > > --- a/SecurityPkg/Library/Tpm2CommandLib/Tpm2Help.c > > +++ b/SecurityPkg/Library/Tpm2CommandLib/Tpm2Help.c > > @@ -299,7 +299,7 @@ GetDigestListSize ( > > UINT32 TotalSize; > > > > TotalSize = sizeof(DigestList->count); > > - for (Index = 0; Index < DigestList->count; Index++) { > > + for (Index = 0; Index < DigestList->count, Index < HASH_COUNT; Index++) > { > > DigestSize = GetHashSizeFromAlgo (DigestList->digests[Index].hashAlg); > > TotalSize += sizeof(DigestList->digests[Index].hashAlg) + DigestSize; > > } > > -- > > 2.18.0.windows.1 ^ permalink raw reply [flat|nested] 5+ messages in thread
* Re: [edk2-devel] [PATCH] SecurityPkg/Tpm2Help.c: Add boundary check for array 2019-12-06 1:49 [PATCH] SecurityPkg/Tpm2Help.c: Add boundary check for array Zhang, Shenglei 2019-12-06 2:04 ` Yao, Jiewen @ 2019-12-06 9:27 ` Laszlo Ersek 2019-12-16 6:58 ` Zhang, Shenglei 1 sibling, 1 reply; 5+ messages in thread From: Laszlo Ersek @ 2019-12-06 9:27 UTC (permalink / raw) To: devel, shenglei.zhang; +Cc: Jiewen Yao, Jian J Wang, Chao Zhang On 12/06/19 02:49, Zhang, Shenglei wrote: > Add 'Index < HASH_COUNT' to ensure things out of boundary > of digests[] can not be visited. > > Cc: Jiewen Yao <jiewen.yao@intel.com> > Cc: Jian J Wang <jian.j.wang@intel.com> > Cc: Chao Zhang <chao.b.zhang@intel.com> > Signed-off-by: Shenglei Zhang <shenglei.zhang@intel.com> > --- > SecurityPkg/Library/Tpm2CommandLib/Tpm2Help.c | 2 +- > 1 file changed, 1 insertion(+), 1 deletion(-) > > diff --git a/SecurityPkg/Library/Tpm2CommandLib/Tpm2Help.c b/SecurityPkg/Library/Tpm2CommandLib/Tpm2Help.c > index 36c240d1221c..a7d4e3ab5373 100644 > --- a/SecurityPkg/Library/Tpm2CommandLib/Tpm2Help.c > +++ b/SecurityPkg/Library/Tpm2CommandLib/Tpm2Help.c > @@ -299,7 +299,7 @@ GetDigestListSize ( > UINT32 TotalSize; > > TotalSize = sizeof(DigestList->count); > - for (Index = 0; Index < DigestList->count; Index++) { > + for (Index = 0; Index < DigestList->count, Index < HASH_COUNT; Index++) { > DigestSize = GetHashSizeFromAlgo (DigestList->digests[Index].hashAlg); > TotalSize += sizeof(DigestList->digests[Index].hashAlg) + DigestSize; > } > Nacked-by: Laszlo Ersek <lersek@redhat.com> The comma operator is either functionally wrong in this context, or stylistically wrong. From the C standard: The left operand of a comma operator is evaluated as a void expression; there is a sequence point after its evaluation. Then the right operand is evaluated; the result has its type and value. [...] In case we *only* need to check (Index < HASH_COUNT), then the patch is stylistically incorrect: the (Index < DigestList->count) condition should simply be removed. In case we need to check *both* conditions, then the patch is functionally wrong: we should either use the logical AND (&&) operator, instead of the comma: Index < DigestList->count && Index < HASH_COUNT or invoke the MIN() function-like macro: Index < MIN ((UINTN)DigestList->count, (UINTN)HASH_COUNT) Thanks Laszlo ^ permalink raw reply [flat|nested] 5+ messages in thread
* Re: [edk2-devel] [PATCH] SecurityPkg/Tpm2Help.c: Add boundary check for array 2019-12-06 9:27 ` [edk2-devel] " Laszlo Ersek @ 2019-12-16 6:58 ` Zhang, Shenglei 0 siblings, 0 replies; 5+ messages in thread From: Zhang, Shenglei @ 2019-12-16 6:58 UTC (permalink / raw) To: devel@edk2.groups.io, lersek@redhat.com Cc: Yao, Jiewen, Wang, Jian J, Zhang, Chao B > -----Original Message----- > From: devel@edk2.groups.io [mailto:devel@edk2.groups.io] On Behalf Of > Laszlo Ersek > Sent: Friday, December 6, 2019 5:27 PM > To: devel@edk2.groups.io; Zhang, Shenglei <shenglei.zhang@intel.com> > Cc: Yao, Jiewen <jiewen.yao@intel.com>; Wang, Jian J > <jian.j.wang@intel.com>; Zhang, Chao B <chao.b.zhang@intel.com> > Subject: Re: [edk2-devel] [PATCH] SecurityPkg/Tpm2Help.c: Add boundary > check for array > > On 12/06/19 02:49, Zhang, Shenglei wrote: > > Add 'Index < HASH_COUNT' to ensure things out of boundary > > of digests[] can not be visited. > > > > Cc: Jiewen Yao <jiewen.yao@intel.com> > > Cc: Jian J Wang <jian.j.wang@intel.com> > > Cc: Chao Zhang <chao.b.zhang@intel.com> > > Signed-off-by: Shenglei Zhang <shenglei.zhang@intel.com> > > --- > > SecurityPkg/Library/Tpm2CommandLib/Tpm2Help.c | 2 +- > > 1 file changed, 1 insertion(+), 1 deletion(-) > > > > diff --git a/SecurityPkg/Library/Tpm2CommandLib/Tpm2Help.c > b/SecurityPkg/Library/Tpm2CommandLib/Tpm2Help.c > > index 36c240d1221c..a7d4e3ab5373 100644 > > --- a/SecurityPkg/Library/Tpm2CommandLib/Tpm2Help.c > > +++ b/SecurityPkg/Library/Tpm2CommandLib/Tpm2Help.c > > @@ -299,7 +299,7 @@ GetDigestListSize ( > > UINT32 TotalSize; > > > > TotalSize = sizeof(DigestList->count); > > - for (Index = 0; Index < DigestList->count; Index++) { > > + for (Index = 0; Index < DigestList->count, Index < HASH_COUNT; Index++) > { > > DigestSize = GetHashSizeFromAlgo (DigestList->digests[Index].hashAlg); > > TotalSize += sizeof(DigestList->digests[Index].hashAlg) + DigestSize; > > } > > > > Nacked-by: Laszlo Ersek <lersek@redhat.com> > > The comma operator is either functionally wrong in this context, or > stylistically wrong. From the C standard: > > The left operand of a comma operator is evaluated as a void > expression; there is a sequence point after its evaluation. Then the > right operand is evaluated; the result has its type and value. [...] > > In case we *only* need to check (Index < HASH_COUNT), then the patch is > stylistically incorrect: the (Index < DigestList->count) condition > should simply be removed. > > In case we need to check *both* conditions, then the patch is > functionally wrong: we should either use the logical AND (&&) operator, > instead of the comma: > > Index < DigestList->count && Index < HASH_COUNT > Hi Laszlo, You are right. I'll change the statement to include both conditions. Thanks, Shenglei > or invoke the MIN() function-like macro: > > Index < MIN ((UINTN)DigestList->count, (UINTN)HASH_COUNT) > > Thanks > Laszlo > > > ^ permalink raw reply [flat|nested] 5+ messages in thread
end of thread, other threads:[~2019-12-16 6:58 UTC | newest] Thread overview: 5+ messages (download: mbox.gz follow: Atom feed -- links below jump to the message on this page -- 2019-12-06 1:49 [PATCH] SecurityPkg/Tpm2Help.c: Add boundary check for array Zhang, Shenglei 2019-12-06 2:04 ` Yao, Jiewen 2019-12-16 6:57 ` Zhang, Shenglei 2019-12-06 9:27 ` [edk2-devel] " Laszlo Ersek 2019-12-16 6:58 ` Zhang, Shenglei
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox