From: erictian Date: Wed, 12 Sep 2012 08:25:25 +0000 (+0000) Subject: SecurityPkg/VariableSmm: Fix a VariableSmm bug when reading variable with size 0. X-Git-Tag: edk2-stable201903~13054 X-Git-Url: https://git.proxmox.com/?p=mirror_edk2.git;a=commitdiff_plain;h=ad84df72c7520dba175bafd246bebd5288456544 SecurityPkg/VariableSmm: Fix a VariableSmm bug when reading variable with size 0. Signed-off-by: Tian, Feng Reviewed-by: Zhang, Chao git-svn-id: https://edk2.svn.sourceforge.net/svnroot/edk2/trunk/edk2@13726 6f19259b-4bc3-4df7-8a09-765794883524 --- diff --git a/SecurityPkg/VariableAuthenticated/RuntimeDxe/VariableSmm.c b/SecurityPkg/VariableAuthenticated/RuntimeDxe/VariableSmm.c index de0a32ee87..c8ee79a1ec 100644 --- a/SecurityPkg/VariableAuthenticated/RuntimeDxe/VariableSmm.c +++ b/SecurityPkg/VariableAuthenticated/RuntimeDxe/VariableSmm.c @@ -431,7 +431,7 @@ SmmVariableHandler ( return EFI_SUCCESS; } - if (*CommBufferSize < sizeof(SMM_VARIABLE_COMMUNICATE_HEADER) - 1) { + if (*CommBufferSize < SMM_VARIABLE_COMMUNICATE_HEADER_SIZE) { return EFI_SUCCESS; }