0026-net-Fix-OOB-write-in-grub_net_search_config_file.patch 3.0 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889
  1. From 7ad4117be44d8cf0443bbc58d49e592a33aaac89 Mon Sep 17 00:00:00 2001
  2. From: B Horn <b@horn.uk>
  3. Date: Fri, 15 Nov 2024 13:12:09 +0000
  4. Subject: [PATCH] net: Fix OOB write in grub_net_search_config_file()
  5. The function included a call to grub_strcpy() which copied data from an
  6. environment variable to a buffer allocated in grub_cmd_normal(). The
  7. grub_cmd_normal() didn't consider the length of the environment variable.
  8. So, the copy operation could exceed the allocation and lead to an OOB
  9. write. Fix the issue by replacing grub_strcpy() with grub_strlcpy() and
  10. pass the underlying buffers size to the grub_net_search_config_file().
  11. Fixes: CVE-2025-0624
  12. Reported-by: B Horn <b@horn.uk>
  13. Signed-off-by: B Horn <b@horn.uk>
  14. Reviewed-by: Daniel Kiper <daniel.kiper@oracle.com>
  15. Conflicts:
  16. grub-core/normal/main.c
  17. Upstream: 5eef88152833062a3f7e017535372d64ac8ef7e1
  18. Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
  19. ---
  20. grub-core/net/net.c | 7 ++++---
  21. grub-core/normal/main.c | 2 +-
  22. include/grub/net.h | 2 +-
  23. 3 files changed, 6 insertions(+), 5 deletions(-)
  24. diff --git a/grub-core/net/net.c b/grub-core/net/net.c
  25. index 8dbb0eada..2bd490279 100644
  26. --- a/grub-core/net/net.c
  27. +++ b/grub-core/net/net.c
  28. @@ -1942,14 +1942,15 @@ grub_config_search_through (char *config, char *suffix,
  29. }
  30. grub_err_t
  31. -grub_net_search_config_file (char *config)
  32. +grub_net_search_config_file (char *config, grub_size_t config_buf_len)
  33. {
  34. - grub_size_t config_len;
  35. + grub_size_t config_len, suffix_len;
  36. char *suffix;
  37. config_len = grub_strlen (config);
  38. config[config_len] = '-';
  39. suffix = config + config_len + 1;
  40. + suffix_len = config_buf_len - (config_len + 1);
  41. struct grub_net_network_level_interface *inf;
  42. FOR_NET_NETWORK_LEVEL_INTERFACES (inf)
  43. @@ -1975,7 +1976,7 @@ grub_net_search_config_file (char *config)
  44. if (client_uuid)
  45. {
  46. - grub_strcpy (suffix, client_uuid);
  47. + grub_strlcpy (suffix, client_uuid, suffix_len);
  48. if (grub_config_search_through (config, suffix, 1, 0) == 0)
  49. return GRUB_ERR_NONE;
  50. }
  51. diff --git a/grub-core/normal/main.c b/grub-core/normal/main.c
  52. index bd4431000..3b48cd333 100644
  53. --- a/grub-core/normal/main.c
  54. +++ b/grub-core/normal/main.c
  55. @@ -344,7 +344,7 @@ grub_cmd_normal (struct grub_command *cmd __attribute__ ((unused)),
  56. if (grub_strncmp (prefix + 1, "tftp", sizeof ("tftp") - 1) == 0 &&
  57. !disable_net_search)
  58. - grub_net_search_config_file (config);
  59. + grub_net_search_config_file (config, config_len);
  60. grub_enter_normal_mode (config);
  61. grub_free (config);
  62. diff --git a/include/grub/net.h b/include/grub/net.h
  63. index 228d04963..58a4f83fc 100644
  64. --- a/include/grub/net.h
  65. +++ b/include/grub/net.h
  66. @@ -570,7 +570,7 @@ void
  67. grub_net_remove_dns_server (const struct grub_net_network_level_address *s);
  68. grub_err_t
  69. -grub_net_search_config_file (char *config);
  70. +grub_net_search_config_file (char *config, grub_size_t config_buf_len);
  71. extern char *grub_net_default_server;
  72. --
  73. 2.50.1