Re: [edk2] [PATCH v2 1/2] MdeModulePkg/SmmCorePerfLib: [CVE-2017-5753] Fix bounds check bypass

2018-11-20 Thread Wu, Hao A
ek; Yao, Jiewen; Zeng, Star > Subject: RE: [edk2] [PATCH v2 1/2] MdeModulePkg/SmmCorePerfLib: [CVE- > 2017-5753] Fix bounds check bypass > > Hao: > In previous discussion, the suggested subject style is > MdeModulePkg/SmmCorePerfLib: Fix bounds check bypass(CVE-2017-5753). >

Re: [edk2] [PATCH v2 1/2] MdeModulePkg/SmmCorePerfLib: [CVE-2017-5753] Fix bounds check bypass

2018-11-20 Thread Gao, Liming
018 12:13 PM > To: edk2-devel@lists.01.org > Cc: Wu, Hao A ; Laszlo Ersek ; Yao, > Jiewen ; Zeng, Star > > Subject: [edk2] [PATCH v2 1/2] MdeModulePkg/SmmCorePerfLib: [CVE-2017-5753] > Fix bounds check bypass > > REF:https://bugzilla.tianocore.org/show_bug.cgi?id=1194 &

Re: [edk2] [PATCH v2 1/2] MdeModulePkg/SmmCorePerfLib: [CVE-2017-5753] Fix bounds check bypass

2018-11-15 Thread Zeng, Star
] MdeModulePkg/SmmCorePerfLib: [CVE-2017-5753] Fix bounds check bypass REF:https://bugzilla.tianocore.org/show_bug.cgi?id=1194 Speculative execution is used by processor to avoid having to wait for data to arrive from memory, or for previous operations to finish, the processor may speculate as to what

[edk2] [PATCH v2 1/2] MdeModulePkg/SmmCorePerfLib: [CVE-2017-5753] Fix bounds check bypass

2018-11-15 Thread Hao Wu
REF:https://bugzilla.tianocore.org/show_bug.cgi?id=1194 Speculative execution is used by processor to avoid having to wait for data to arrive from memory, or for previous operations to finish, the processor may speculate as to what will be executed. If the speculation is incorrect, the