diff options
author | Peter Marko <peter.marko@siemens.com> | 2025-03-11 19:14:14 +0100 |
---|---|---|
committer | Steve Sakoman <steve@sakoman.com> | 2025-03-15 06:44:47 -0700 |
commit | 88680b5de21d1e16baceaf050b83b13025100ab4 (patch) | |
tree | d7136cdf67a876cf6a819891ab316a55e3dbb8fb | |
parent | 63b8665d9c6a2e0fd6df9ed0be5636c518442700 (diff) | |
download | poky-88680b5de21d1e16baceaf050b83b13025100ab4.tar.gz |
grub: patch CVE-2025-0624
Cherry-pick patch mentioning this CVE.
(From OE-Core rev: 29778ceddd775c47d722ecf1cc587c6526202d0b)
Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
-rw-r--r-- | meta/recipes-bsp/grub/files/CVE-2025-0624.patch | 84 | ||||
-rw-r--r-- | meta/recipes-bsp/grub/grub2.inc | 1 |
2 files changed, 85 insertions, 0 deletions
diff --git a/meta/recipes-bsp/grub/files/CVE-2025-0624.patch b/meta/recipes-bsp/grub/files/CVE-2025-0624.patch new file mode 100644 index 0000000000..229fe6399e --- /dev/null +++ b/meta/recipes-bsp/grub/files/CVE-2025-0624.patch | |||
@@ -0,0 +1,84 @@ | |||
1 | From 5eef88152833062a3f7e017535372d64ac8ef7e1 Mon Sep 17 00:00:00 2001 | ||
2 | From: B Horn <b@horn.uk> | ||
3 | Date: Fri, 15 Nov 2024 13:12:09 +0000 | ||
4 | Subject: [PATCH] net: Fix OOB write in grub_net_search_config_file() | ||
5 | |||
6 | The function included a call to grub_strcpy() which copied data from an | ||
7 | environment variable to a buffer allocated in grub_cmd_normal(). The | ||
8 | grub_cmd_normal() didn't consider the length of the environment variable. | ||
9 | So, the copy operation could exceed the allocation and lead to an OOB | ||
10 | write. Fix the issue by replacing grub_strcpy() with grub_strlcpy() and | ||
11 | pass the underlying buffers size to the grub_net_search_config_file(). | ||
12 | |||
13 | Fixes: CVE-2025-0624 | ||
14 | |||
15 | Reported-by: B Horn <b@horn.uk> | ||
16 | Signed-off-by: B Horn <b@horn.uk> | ||
17 | Reviewed-by: Daniel Kiper <daniel.kiper@oracle.com> | ||
18 | |||
19 | CVE: CVE-2025-0624 | ||
20 | Upstream-Status: Backport [https://git.savannah.gnu.org/cgit/grub.git/commit/?id=5eef88152833062a3f7e017535372d64ac8ef7e1] | ||
21 | Signed-off-by: Peter Marko <peter.marko@siemens.com> | ||
22 | --- | ||
23 | grub-core/net/net.c | 7 ++++--- | ||
24 | grub-core/normal/main.c | 2 +- | ||
25 | include/grub/net.h | 2 +- | ||
26 | 3 files changed, 6 insertions(+), 5 deletions(-) | ||
27 | |||
28 | diff --git a/grub-core/net/net.c b/grub-core/net/net.c | ||
29 | index 0e41e21a5..9939ff601 100644 | ||
30 | --- a/grub-core/net/net.c | ||
31 | +++ b/grub-core/net/net.c | ||
32 | @@ -1909,14 +1909,15 @@ grub_config_search_through (char *config, char *suffix, | ||
33 | } | ||
34 | |||
35 | grub_err_t | ||
36 | -grub_net_search_config_file (char *config) | ||
37 | +grub_net_search_config_file (char *config, grub_size_t config_buf_len) | ||
38 | { | ||
39 | - grub_size_t config_len; | ||
40 | + grub_size_t config_len, suffix_len; | ||
41 | char *suffix; | ||
42 | |||
43 | config_len = grub_strlen (config); | ||
44 | config[config_len] = '-'; | ||
45 | suffix = config + config_len + 1; | ||
46 | + suffix_len = config_buf_len - (config_len + 1); | ||
47 | |||
48 | struct grub_net_network_level_interface *inf; | ||
49 | FOR_NET_NETWORK_LEVEL_INTERFACES (inf) | ||
50 | @@ -1942,7 +1943,7 @@ grub_net_search_config_file (char *config) | ||
51 | |||
52 | if (client_uuid) | ||
53 | { | ||
54 | - grub_strcpy (suffix, client_uuid); | ||
55 | + grub_strlcpy (suffix, client_uuid, suffix_len); | ||
56 | if (grub_config_search_through (config, suffix, 1, 0) == 0) | ||
57 | return GRUB_ERR_NONE; | ||
58 | } | ||
59 | diff --git a/grub-core/normal/main.c b/grub-core/normal/main.c | ||
60 | index 90879dc21..838f57fa5 100644 | ||
61 | --- a/grub-core/normal/main.c | ||
62 | +++ b/grub-core/normal/main.c | ||
63 | @@ -344,7 +344,7 @@ grub_cmd_normal (struct grub_command *cmd __attribute__ ((unused)), | ||
64 | |||
65 | if (grub_strncmp (prefix + 1, "tftp", sizeof ("tftp") - 1) == 0 && | ||
66 | !disable_net_search) | ||
67 | - grub_net_search_config_file (config); | ||
68 | + grub_net_search_config_file (config, config_len); | ||
69 | |||
70 | grub_enter_normal_mode (config); | ||
71 | grub_free (config); | ||
72 | diff --git a/include/grub/net.h b/include/grub/net.h | ||
73 | index 228d04963..58a4f83fc 100644 | ||
74 | --- a/include/grub/net.h | ||
75 | +++ b/include/grub/net.h | ||
76 | @@ -579,7 +579,7 @@ void | ||
77 | grub_net_remove_dns_server (const struct grub_net_network_level_address *s); | ||
78 | |||
79 | grub_err_t | ||
80 | -grub_net_search_config_file (char *config); | ||
81 | +grub_net_search_config_file (char *config, grub_size_t config_buf_len); | ||
82 | |||
83 | extern char *grub_net_default_server; | ||
84 | |||
diff --git a/meta/recipes-bsp/grub/grub2.inc b/meta/recipes-bsp/grub/grub2.inc index 05aea4cc6a..3526c43835 100644 --- a/meta/recipes-bsp/grub/grub2.inc +++ b/meta/recipes-bsp/grub/grub2.inc | |||
@@ -23,6 +23,7 @@ SRC_URI = "${GNU_MIRROR}/grub/grub-${PV}.tar.gz \ | |||
23 | file://CVE-2024-45782_CVE-2024-56737.patch \ | 23 | file://CVE-2024-45782_CVE-2024-56737.patch \ |
24 | file://CVE-2024-45780.patch \ | 24 | file://CVE-2024-45780.patch \ |
25 | file://CVE-2024-45783.patch \ | 25 | file://CVE-2024-45783.patch \ |
26 | file://CVE-2025-0624.patch \ | ||
26 | " | 27 | " |
27 | 28 | ||
28 | SRC_URI[sha256sum] = "b30919fa5be280417c17ac561bb1650f60cfb80cc6237fa1e2b6f56154cb9c91" | 29 | SRC_URI[sha256sum] = "b30919fa5be280417c17ac561bb1650f60cfb80cc6237fa1e2b6f56154cb9c91" |