diff options
| -rw-r--r-- | meta/recipes-bsp/grub/files/CVE-2025-0624.patch | 84 | ||||
| -rw-r--r-- | meta/recipes-bsp/grub/grub2.inc | 1 |
2 files changed, 85 insertions, 0 deletions
diff --git a/meta/recipes-bsp/grub/files/CVE-2025-0624.patch b/meta/recipes-bsp/grub/files/CVE-2025-0624.patch new file mode 100644 index 0000000000..229fe6399e --- /dev/null +++ b/meta/recipes-bsp/grub/files/CVE-2025-0624.patch | |||
| @@ -0,0 +1,84 @@ | |||
| 1 | From 5eef88152833062a3f7e017535372d64ac8ef7e1 Mon Sep 17 00:00:00 2001 | ||
| 2 | From: B Horn <b@horn.uk> | ||
| 3 | Date: Fri, 15 Nov 2024 13:12:09 +0000 | ||
| 4 | Subject: [PATCH] net: Fix OOB write in grub_net_search_config_file() | ||
| 5 | |||
| 6 | The function included a call to grub_strcpy() which copied data from an | ||
| 7 | environment variable to a buffer allocated in grub_cmd_normal(). The | ||
| 8 | grub_cmd_normal() didn't consider the length of the environment variable. | ||
| 9 | So, the copy operation could exceed the allocation and lead to an OOB | ||
| 10 | write. Fix the issue by replacing grub_strcpy() with grub_strlcpy() and | ||
| 11 | pass the underlying buffers size to the grub_net_search_config_file(). | ||
| 12 | |||
| 13 | Fixes: CVE-2025-0624 | ||
| 14 | |||
| 15 | Reported-by: B Horn <b@horn.uk> | ||
| 16 | Signed-off-by: B Horn <b@horn.uk> | ||
| 17 | Reviewed-by: Daniel Kiper <daniel.kiper@oracle.com> | ||
| 18 | |||
| 19 | CVE: CVE-2025-0624 | ||
| 20 | Upstream-Status: Backport [https://git.savannah.gnu.org/cgit/grub.git/commit/?id=5eef88152833062a3f7e017535372d64ac8ef7e1] | ||
| 21 | Signed-off-by: Peter Marko <peter.marko@siemens.com> | ||
| 22 | --- | ||
| 23 | grub-core/net/net.c | 7 ++++--- | ||
| 24 | grub-core/normal/main.c | 2 +- | ||
| 25 | include/grub/net.h | 2 +- | ||
| 26 | 3 files changed, 6 insertions(+), 5 deletions(-) | ||
| 27 | |||
| 28 | diff --git a/grub-core/net/net.c b/grub-core/net/net.c | ||
| 29 | index 0e41e21a5..9939ff601 100644 | ||
| 30 | --- a/grub-core/net/net.c | ||
| 31 | +++ b/grub-core/net/net.c | ||
| 32 | @@ -1909,14 +1909,15 @@ grub_config_search_through (char *config, char *suffix, | ||
| 33 | } | ||
| 34 | |||
| 35 | grub_err_t | ||
| 36 | -grub_net_search_config_file (char *config) | ||
| 37 | +grub_net_search_config_file (char *config, grub_size_t config_buf_len) | ||
| 38 | { | ||
| 39 | - grub_size_t config_len; | ||
| 40 | + grub_size_t config_len, suffix_len; | ||
| 41 | char *suffix; | ||
| 42 | |||
| 43 | config_len = grub_strlen (config); | ||
| 44 | config[config_len] = '-'; | ||
| 45 | suffix = config + config_len + 1; | ||
| 46 | + suffix_len = config_buf_len - (config_len + 1); | ||
| 47 | |||
| 48 | struct grub_net_network_level_interface *inf; | ||
| 49 | FOR_NET_NETWORK_LEVEL_INTERFACES (inf) | ||
| 50 | @@ -1942,7 +1943,7 @@ grub_net_search_config_file (char *config) | ||
| 51 | |||
| 52 | if (client_uuid) | ||
| 53 | { | ||
| 54 | - grub_strcpy (suffix, client_uuid); | ||
| 55 | + grub_strlcpy (suffix, client_uuid, suffix_len); | ||
| 56 | if (grub_config_search_through (config, suffix, 1, 0) == 0) | ||
| 57 | return GRUB_ERR_NONE; | ||
| 58 | } | ||
| 59 | diff --git a/grub-core/normal/main.c b/grub-core/normal/main.c | ||
| 60 | index 90879dc21..838f57fa5 100644 | ||
| 61 | --- a/grub-core/normal/main.c | ||
| 62 | +++ b/grub-core/normal/main.c | ||
| 63 | @@ -344,7 +344,7 @@ grub_cmd_normal (struct grub_command *cmd __attribute__ ((unused)), | ||
| 64 | |||
| 65 | if (grub_strncmp (prefix + 1, "tftp", sizeof ("tftp") - 1) == 0 && | ||
| 66 | !disable_net_search) | ||
| 67 | - grub_net_search_config_file (config); | ||
| 68 | + grub_net_search_config_file (config, config_len); | ||
| 69 | |||
| 70 | grub_enter_normal_mode (config); | ||
| 71 | grub_free (config); | ||
| 72 | diff --git a/include/grub/net.h b/include/grub/net.h | ||
| 73 | index 228d04963..58a4f83fc 100644 | ||
| 74 | --- a/include/grub/net.h | ||
| 75 | +++ b/include/grub/net.h | ||
| 76 | @@ -579,7 +579,7 @@ void | ||
| 77 | grub_net_remove_dns_server (const struct grub_net_network_level_address *s); | ||
| 78 | |||
| 79 | grub_err_t | ||
| 80 | -grub_net_search_config_file (char *config); | ||
| 81 | +grub_net_search_config_file (char *config, grub_size_t config_buf_len); | ||
| 82 | |||
| 83 | extern char *grub_net_default_server; | ||
| 84 | |||
diff --git a/meta/recipes-bsp/grub/grub2.inc b/meta/recipes-bsp/grub/grub2.inc index 604c2fe568..9e037e953e 100644 --- a/meta/recipes-bsp/grub/grub2.inc +++ b/meta/recipes-bsp/grub/grub2.inc | |||
| @@ -24,6 +24,7 @@ SRC_URI = "${GNU_MIRROR}/grub/grub-${PV}.tar.gz \ | |||
| 24 | file://CVE-2024-45782_CVE-2024-56737.patch \ | 24 | file://CVE-2024-45782_CVE-2024-56737.patch \ |
| 25 | file://CVE-2024-45780.patch \ | 25 | file://CVE-2024-45780.patch \ |
| 26 | file://CVE-2024-45783.patch \ | 26 | file://CVE-2024-45783.patch \ |
| 27 | file://CVE-2025-0624.patch \ | ||
| 27 | " | 28 | " |
| 28 | 29 | ||
| 29 | SRC_URI[sha256sum] = "b30919fa5be280417c17ac561bb1650f60cfb80cc6237fa1e2b6f56154cb9c91" | 30 | SRC_URI[sha256sum] = "b30919fa5be280417c17ac561bb1650f60cfb80cc6237fa1e2b6f56154cb9c91" |
