Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add AssignReviewers python script #7

Merged
merged 3 commits into from
Feb 25, 2020

Conversation

mdkinney
Copy link
Owner

Signed-off-by: Michael D Kinney [email protected]

@mdkinney mdkinney requested a review from svenur as a code owner February 19, 2020 17:49
svenur
svenur previously approved these changes Feb 19, 2020
Copy link
Owner Author

@mdkinney mdkinney left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@mdkinney Request Review 2
@svenur Request Review 2

Collect GitHub IDs and email address of maintainers
and reviewers for each commit in a pull request.  The
file Maintainer.txt and GetMaintainers.py are used to
collect this information on each commit.  A comment
is added to each commit with the reviewer assignments
and the set of reviewers from all the commits are
assigned to the pull request.

Signed-off-by: Michael D Kinney <[email protected]>
Add -t, --tag option to preserve the tag (R:, M:, L:)
form Maintainers.txt.

Signed-off-by: Michael D Kinney <[email protected]>
@mdkinney mdkinney force-pushed the sandbox/AssignReviewers branch from 3429b45 to 63dc33b Compare February 25, 2020 23:19
@mdkinney mdkinney merged commit fb5fc30 into sandbox/master Feb 25, 2020
mdkinney pushed a commit that referenced this pull request Feb 7, 2024
REF:https://bugzilla.tianocore.org/show_bug.cgi?id=4540

Bug Details:
PixieFail Bug #7
CVE-2023-45235
CVSS 8.3 : CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:H
CWE-119 Improper Restriction of Operations within the Bounds of
 a Memory Buffer

Buffer overflow when handling Server ID option from a DHCPv6 proxy
Advertise message

Change Overview:

Performs two checks

1. Checks that the length of the duid is accurate
> + //
> + // Check that the minimum and maximum requirements are met
> + //
> + if ((OpLen < PXEBC_MIN_SIZE_OF_DUID) ||
(OpLen > PXEBC_MAX_SIZE_OF_DUID)) {
> +  Status = EFI_INVALID_PARAMETER;
> +  goto ON_ERROR;
> + }

2. Ensures that the amount of data written to the buffer is tracked and
never exceeds that
> + //
> + // Check that the option length is valid.
> + //
> + if ((DiscoverLen + OpLen + PXEBC_COMBINED_SIZE_OF_OPT_CODE_AND_LEN)
 > DiscoverLenNeeded) {
> +     Status = EFI_OUT_OF_RESOURCES;
> +     goto ON_ERROR;
> + }

Additional code clean up and fix for memory leak in case Option was NULL

Cc: Saloni Kasbekar <[email protected]>
Cc: Zachary Clark-williams <[email protected]>

Signed-off-by: Doug Flick [MSFT] <[email protected]>
Reviewed-by: Saloni Kasbekar <[email protected]>
mdkinney pushed a commit that referenced this pull request Nov 4, 2024
This patch does not impact functionality. It aims to clarify the
synchronization flow between the BSP and APs to enhance code
readability and understanding:

Steps #6 and #11 are the basic synchronization requirements for all
cases.

Steps #1 is additional requirements if the MmCpuSyncModeTradition
mode is selected.

Steps #1, #2, #3, #4, #5, #7, #8, #9, and #10 are additional
requirements if the system needs to configure the MTRR.

Steps #9 and #10 are additional requirements if the system needs to
support the mSmmDebugAgentSupport.

Signed-off-by: Jiaxin Wu <[email protected]>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants