public inbox for devel@edk2.groups.io
 help / color / mirror / Atom feed
* [PATCH] SecurityPkg/Tpm2Help.c: Add boundary check for array
@ 2019-12-06  1:49 Zhang, Shenglei
  2019-12-06  2:04 ` Yao, Jiewen
  2019-12-06  9:27 ` [edk2-devel] " Laszlo Ersek
  0 siblings, 2 replies; 5+ messages in thread
From: Zhang, Shenglei @ 2019-12-06  1:49 UTC (permalink / raw)
  To: devel; +Cc: Jiewen Yao, Jian J Wang, Chao Zhang

Add 'Index < HASH_COUNT' to ensure things out of boundary
of digests[] can not be visited.

Cc: Jiewen Yao <jiewen.yao@intel.com>
Cc: Jian J Wang <jian.j.wang@intel.com>
Cc: Chao Zhang <chao.b.zhang@intel.com>
Signed-off-by: Shenglei Zhang <shenglei.zhang@intel.com>
---
 SecurityPkg/Library/Tpm2CommandLib/Tpm2Help.c | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/SecurityPkg/Library/Tpm2CommandLib/Tpm2Help.c b/SecurityPkg/Library/Tpm2CommandLib/Tpm2Help.c
index 36c240d1221c..a7d4e3ab5373 100644
--- a/SecurityPkg/Library/Tpm2CommandLib/Tpm2Help.c
+++ b/SecurityPkg/Library/Tpm2CommandLib/Tpm2Help.c
@@ -299,7 +299,7 @@ GetDigestListSize (
   UINT32 TotalSize;
 
   TotalSize = sizeof(DigestList->count);
-  for (Index = 0; Index < DigestList->count; Index++) {
+  for (Index = 0; Index < DigestList->count, Index < HASH_COUNT; Index++) {
     DigestSize = GetHashSizeFromAlgo (DigestList->digests[Index].hashAlg);
     TotalSize += sizeof(DigestList->digests[Index].hashAlg) + DigestSize;
   }
-- 
2.18.0.windows.1


^ permalink raw reply related	[flat|nested] 5+ messages in thread

* Re: [PATCH] SecurityPkg/Tpm2Help.c: Add boundary check for array
  2019-12-06  1:49 [PATCH] SecurityPkg/Tpm2Help.c: Add boundary check for array Zhang, Shenglei
@ 2019-12-06  2:04 ` Yao, Jiewen
  2019-12-16  6:57   ` Zhang, Shenglei
  2019-12-06  9:27 ` [edk2-devel] " Laszlo Ersek
  1 sibling, 1 reply; 5+ messages in thread
From: Yao, Jiewen @ 2019-12-06  2:04 UTC (permalink / raw)
  To: Zhang, Shenglei, devel@edk2.groups.io; +Cc: Wang, Jian J, Zhang, Chao B

Hi
May I know where is the data from? Trusted region or non-trusted region?

I am thinking if we need use ASSERT to avoid user mistake.
But want to check the API input assumption at first...



> -----Original Message-----
> From: Zhang, Shenglei <shenglei.zhang@intel.com>
> Sent: Friday, December 6, 2019 9:50 AM
> To: devel@edk2.groups.io
> Cc: Yao, Jiewen <jiewen.yao@intel.com>; Wang, Jian J <jian.j.wang@intel.com>;
> Zhang, Chao B <chao.b.zhang@intel.com>
> Subject: [PATCH] SecurityPkg/Tpm2Help.c: Add boundary check for array
> 
> Add 'Index < HASH_COUNT' to ensure things out of boundary
> of digests[] can not be visited.
> 
> Cc: Jiewen Yao <jiewen.yao@intel.com>
> Cc: Jian J Wang <jian.j.wang@intel.com>
> Cc: Chao Zhang <chao.b.zhang@intel.com>
> Signed-off-by: Shenglei Zhang <shenglei.zhang@intel.com>
> ---
>  SecurityPkg/Library/Tpm2CommandLib/Tpm2Help.c | 2 +-
>  1 file changed, 1 insertion(+), 1 deletion(-)
> 
> diff --git a/SecurityPkg/Library/Tpm2CommandLib/Tpm2Help.c
> b/SecurityPkg/Library/Tpm2CommandLib/Tpm2Help.c
> index 36c240d1221c..a7d4e3ab5373 100644
> --- a/SecurityPkg/Library/Tpm2CommandLib/Tpm2Help.c
> +++ b/SecurityPkg/Library/Tpm2CommandLib/Tpm2Help.c
> @@ -299,7 +299,7 @@ GetDigestListSize (
>    UINT32 TotalSize;
> 
>    TotalSize = sizeof(DigestList->count);
> -  for (Index = 0; Index < DigestList->count; Index++) {
> +  for (Index = 0; Index < DigestList->count, Index < HASH_COUNT; Index++) {
>      DigestSize = GetHashSizeFromAlgo (DigestList->digests[Index].hashAlg);
>      TotalSize += sizeof(DigestList->digests[Index].hashAlg) + DigestSize;
>    }
> --
> 2.18.0.windows.1


^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: [edk2-devel] [PATCH] SecurityPkg/Tpm2Help.c: Add boundary check for array
  2019-12-06  1:49 [PATCH] SecurityPkg/Tpm2Help.c: Add boundary check for array Zhang, Shenglei
  2019-12-06  2:04 ` Yao, Jiewen
@ 2019-12-06  9:27 ` Laszlo Ersek
  2019-12-16  6:58   ` Zhang, Shenglei
  1 sibling, 1 reply; 5+ messages in thread
From: Laszlo Ersek @ 2019-12-06  9:27 UTC (permalink / raw)
  To: devel, shenglei.zhang; +Cc: Jiewen Yao, Jian J Wang, Chao Zhang

On 12/06/19 02:49, Zhang, Shenglei wrote:
> Add 'Index < HASH_COUNT' to ensure things out of boundary
> of digests[] can not be visited.
> 
> Cc: Jiewen Yao <jiewen.yao@intel.com>
> Cc: Jian J Wang <jian.j.wang@intel.com>
> Cc: Chao Zhang <chao.b.zhang@intel.com>
> Signed-off-by: Shenglei Zhang <shenglei.zhang@intel.com>
> ---
>  SecurityPkg/Library/Tpm2CommandLib/Tpm2Help.c | 2 +-
>  1 file changed, 1 insertion(+), 1 deletion(-)
> 
> diff --git a/SecurityPkg/Library/Tpm2CommandLib/Tpm2Help.c b/SecurityPkg/Library/Tpm2CommandLib/Tpm2Help.c
> index 36c240d1221c..a7d4e3ab5373 100644
> --- a/SecurityPkg/Library/Tpm2CommandLib/Tpm2Help.c
> +++ b/SecurityPkg/Library/Tpm2CommandLib/Tpm2Help.c
> @@ -299,7 +299,7 @@ GetDigestListSize (
>    UINT32 TotalSize;
>  
>    TotalSize = sizeof(DigestList->count);
> -  for (Index = 0; Index < DigestList->count; Index++) {
> +  for (Index = 0; Index < DigestList->count, Index < HASH_COUNT; Index++) {
>      DigestSize = GetHashSizeFromAlgo (DigestList->digests[Index].hashAlg);
>      TotalSize += sizeof(DigestList->digests[Index].hashAlg) + DigestSize;
>    }
> 

Nacked-by: Laszlo Ersek <lersek@redhat.com>

The comma operator is either functionally wrong in this context, or
stylistically wrong. From the C standard:

    The left operand of a comma operator is evaluated as a void
    expression; there is a sequence point after its evaluation. Then the
    right operand is evaluated; the result has its type and value. [...]

In case we *only* need to check (Index < HASH_COUNT), then the patch is
stylistically incorrect: the (Index < DigestList->count) condition
should simply be removed.

In case we need to check *both* conditions, then the patch is
functionally wrong: we should either use the logical AND (&&) operator,
instead of the comma:

  Index < DigestList->count && Index < HASH_COUNT

or invoke the MIN() function-like macro:

  Index < MIN ((UINTN)DigestList->count, (UINTN)HASH_COUNT)

Thanks
Laszlo


^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: [PATCH] SecurityPkg/Tpm2Help.c: Add boundary check for array
  2019-12-06  2:04 ` Yao, Jiewen
@ 2019-12-16  6:57   ` Zhang, Shenglei
  0 siblings, 0 replies; 5+ messages in thread
From: Zhang, Shenglei @ 2019-12-16  6:57 UTC (permalink / raw)
  To: Yao, Jiewen, devel@edk2.groups.io; +Cc: Wang, Jian J, Zhang, Chao B



> -----Original Message-----
> From: Yao, Jiewen
> Sent: Friday, December 6, 2019 10:04 AM
> To: Zhang, Shenglei <shenglei.zhang@intel.com>; devel@edk2.groups.io
> Cc: Wang, Jian J <jian.j.wang@intel.com>; Zhang, Chao B
> <chao.b.zhang@intel.com>
> Subject: RE: [PATCH] SecurityPkg/Tpm2Help.c: Add boundary check for array
> 
> Hi
> May I know where is the data from? Trusted region or non-trusted region?
> 
> I am thinking if we need use ASSERT to avoid user mistake.
> But want to check the API input assumption at first...

Hi Jiewen,

I don't think DigestList->count can be trusted. We can add Index < HASH_COUNT into the
for(...) statement.

Thanks,
Shenglei

> 
> 
> 
> > -----Original Message-----
> > From: Zhang, Shenglei <shenglei.zhang@intel.com>
> > Sent: Friday, December 6, 2019 9:50 AM
> > To: devel@edk2.groups.io
> > Cc: Yao, Jiewen <jiewen.yao@intel.com>; Wang, Jian J
> <jian.j.wang@intel.com>;
> > Zhang, Chao B <chao.b.zhang@intel.com>
> > Subject: [PATCH] SecurityPkg/Tpm2Help.c: Add boundary check for array
> >
> > Add 'Index < HASH_COUNT' to ensure things out of boundary
> > of digests[] can not be visited.
> >
> > Cc: Jiewen Yao <jiewen.yao@intel.com>
> > Cc: Jian J Wang <jian.j.wang@intel.com>
> > Cc: Chao Zhang <chao.b.zhang@intel.com>
> > Signed-off-by: Shenglei Zhang <shenglei.zhang@intel.com>
> > ---
> >  SecurityPkg/Library/Tpm2CommandLib/Tpm2Help.c | 2 +-
> >  1 file changed, 1 insertion(+), 1 deletion(-)
> >
> > diff --git a/SecurityPkg/Library/Tpm2CommandLib/Tpm2Help.c
> > b/SecurityPkg/Library/Tpm2CommandLib/Tpm2Help.c
> > index 36c240d1221c..a7d4e3ab5373 100644
> > --- a/SecurityPkg/Library/Tpm2CommandLib/Tpm2Help.c
> > +++ b/SecurityPkg/Library/Tpm2CommandLib/Tpm2Help.c
> > @@ -299,7 +299,7 @@ GetDigestListSize (
> >    UINT32 TotalSize;
> >
> >    TotalSize = sizeof(DigestList->count);
> > -  for (Index = 0; Index < DigestList->count; Index++) {
> > +  for (Index = 0; Index < DigestList->count, Index < HASH_COUNT; Index++)
> {
> >      DigestSize = GetHashSizeFromAlgo (DigestList->digests[Index].hashAlg);
> >      TotalSize += sizeof(DigestList->digests[Index].hashAlg) + DigestSize;
> >    }
> > --
> > 2.18.0.windows.1


^ permalink raw reply	[flat|nested] 5+ messages in thread

* Re: [edk2-devel] [PATCH] SecurityPkg/Tpm2Help.c: Add boundary check for array
  2019-12-06  9:27 ` [edk2-devel] " Laszlo Ersek
@ 2019-12-16  6:58   ` Zhang, Shenglei
  0 siblings, 0 replies; 5+ messages in thread
From: Zhang, Shenglei @ 2019-12-16  6:58 UTC (permalink / raw)
  To: devel@edk2.groups.io, lersek@redhat.com
  Cc: Yao, Jiewen, Wang, Jian J, Zhang, Chao B



> -----Original Message-----
> From: devel@edk2.groups.io [mailto:devel@edk2.groups.io] On Behalf Of
> Laszlo Ersek
> Sent: Friday, December 6, 2019 5:27 PM
> To: devel@edk2.groups.io; Zhang, Shenglei <shenglei.zhang@intel.com>
> Cc: Yao, Jiewen <jiewen.yao@intel.com>; Wang, Jian J
> <jian.j.wang@intel.com>; Zhang, Chao B <chao.b.zhang@intel.com>
> Subject: Re: [edk2-devel] [PATCH] SecurityPkg/Tpm2Help.c: Add boundary
> check for array
> 
> On 12/06/19 02:49, Zhang, Shenglei wrote:
> > Add 'Index < HASH_COUNT' to ensure things out of boundary
> > of digests[] can not be visited.
> >
> > Cc: Jiewen Yao <jiewen.yao@intel.com>
> > Cc: Jian J Wang <jian.j.wang@intel.com>
> > Cc: Chao Zhang <chao.b.zhang@intel.com>
> > Signed-off-by: Shenglei Zhang <shenglei.zhang@intel.com>
> > ---
> >  SecurityPkg/Library/Tpm2CommandLib/Tpm2Help.c | 2 +-
> >  1 file changed, 1 insertion(+), 1 deletion(-)
> >
> > diff --git a/SecurityPkg/Library/Tpm2CommandLib/Tpm2Help.c
> b/SecurityPkg/Library/Tpm2CommandLib/Tpm2Help.c
> > index 36c240d1221c..a7d4e3ab5373 100644
> > --- a/SecurityPkg/Library/Tpm2CommandLib/Tpm2Help.c
> > +++ b/SecurityPkg/Library/Tpm2CommandLib/Tpm2Help.c
> > @@ -299,7 +299,7 @@ GetDigestListSize (
> >    UINT32 TotalSize;
> >
> >    TotalSize = sizeof(DigestList->count);
> > -  for (Index = 0; Index < DigestList->count; Index++) {
> > +  for (Index = 0; Index < DigestList->count, Index < HASH_COUNT; Index++)
> {
> >      DigestSize = GetHashSizeFromAlgo (DigestList->digests[Index].hashAlg);
> >      TotalSize += sizeof(DigestList->digests[Index].hashAlg) + DigestSize;
> >    }
> >
> 
> Nacked-by: Laszlo Ersek <lersek@redhat.com>
> 
> The comma operator is either functionally wrong in this context, or
> stylistically wrong. From the C standard:
> 
>     The left operand of a comma operator is evaluated as a void
>     expression; there is a sequence point after its evaluation. Then the
>     right operand is evaluated; the result has its type and value. [...]
> 
> In case we *only* need to check (Index < HASH_COUNT), then the patch is
> stylistically incorrect: the (Index < DigestList->count) condition
> should simply be removed.
> 
> In case we need to check *both* conditions, then the patch is
> functionally wrong: we should either use the logical AND (&&) operator,
> instead of the comma:
> 
>   Index < DigestList->count && Index < HASH_COUNT
> 

Hi Laszlo,

You are right. I'll change the statement to include both conditions.

Thanks,
Shenglei

> or invoke the MIN() function-like macro:
> 
>   Index < MIN ((UINTN)DigestList->count, (UINTN)HASH_COUNT)
> 
> Thanks
> Laszlo
> 
> 
> 


^ permalink raw reply	[flat|nested] 5+ messages in thread

end of thread, other threads:[~2019-12-16  6:58 UTC | newest]

Thread overview: 5+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2019-12-06  1:49 [PATCH] SecurityPkg/Tpm2Help.c: Add boundary check for array Zhang, Shenglei
2019-12-06  2:04 ` Yao, Jiewen
2019-12-16  6:57   ` Zhang, Shenglei
2019-12-06  9:27 ` [edk2-devel] " Laszlo Ersek
2019-12-16  6:58   ` Zhang, Shenglei

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox