|
|
a4d572 |
From 6df814d4f43a47ffe2b354b9fa683ed4022fa5f1 Mon Sep 17 00:00:00 2001
|
|
|
a4d572 |
From: Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
|
|
|
a4d572 |
Date: Tue, 7 Jul 2020 15:12:25 -0400
|
|
|
a4d572 |
Subject: [PATCH 291/314] term: Fix overflow on user inputs
|
|
|
a4d572 |
|
|
|
a4d572 |
This requires a very weird input from the serial interface but can cause
|
|
|
a4d572 |
an overflow in input_buf (keys) overwriting the next variable (npending)
|
|
|
a4d572 |
with the user choice:
|
|
|
a4d572 |
|
|
|
a4d572 |
(pahole output)
|
|
|
a4d572 |
|
|
|
a4d572 |
struct grub_terminfo_input_state {
|
|
|
a4d572 |
int input_buf[6]; /* 0 24 */
|
|
|
a4d572 |
int npending; /* 24 4 */ <- CORRUPT
|
|
|
a4d572 |
...snip...
|
|
|
a4d572 |
|
|
|
a4d572 |
The magic string requires causing this is "ESC,O,],0,1,2,q" and we overflow
|
|
|
a4d572 |
npending with "q" (aka increase npending to 161). The simplest fix is to
|
|
|
a4d572 |
just to disallow overwrites input_buf, which exactly what this patch does.
|
|
|
a4d572 |
|
|
|
a4d572 |
Fixes: CID 292449
|
|
|
a4d572 |
|
|
|
a4d572 |
Signed-off-by: Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
|
|
|
a4d572 |
Reviewed-by: Daniel Kiper <daniel.kiper@oracle.com>
|
|
|
a4d572 |
Upstream-commit-id: 98dfa546777
|
|
|
a4d572 |
---
|
|
|
a4d572 |
grub-core/term/terminfo.c | 9 ++++++---
|
|
|
a4d572 |
1 file changed, 6 insertions(+), 3 deletions(-)
|
|
|
a4d572 |
|
|
|
a4d572 |
diff --git a/grub-core/term/terminfo.c b/grub-core/term/terminfo.c
|
|
|
a4d572 |
index 537a5c0cb0b..44d0b3b19fb 100644
|
|
|
a4d572 |
--- a/grub-core/term/terminfo.c
|
|
|
a4d572 |
+++ b/grub-core/term/terminfo.c
|
|
|
a4d572 |
@@ -398,7 +398,7 @@ grub_terminfo_getwh (struct grub_term_output *term)
|
|
|
a4d572 |
}
|
|
|
a4d572 |
|
|
|
a4d572 |
static void
|
|
|
a4d572 |
-grub_terminfo_readkey (struct grub_term_input *term, int *keys, int *len,
|
|
|
a4d572 |
+grub_terminfo_readkey (struct grub_term_input *term, int *keys, int *len, int max_len,
|
|
|
a4d572 |
int (*readkey) (struct grub_term_input *term))
|
|
|
a4d572 |
{
|
|
|
a4d572 |
int c;
|
|
|
a4d572 |
@@ -414,6 +414,9 @@ grub_terminfo_readkey (struct grub_term_input *term, int *keys, int *len,
|
|
|
a4d572 |
if (c == -1) \
|
|
|
a4d572 |
return; \
|
|
|
a4d572 |
\
|
|
|
a4d572 |
+ if (*len >= max_len) \
|
|
|
a4d572 |
+ return; \
|
|
|
a4d572 |
+ \
|
|
|
a4d572 |
keys[*len] = c; \
|
|
|
a4d572 |
(*len)++; \
|
|
|
a4d572 |
}
|
|
|
a4d572 |
@@ -602,8 +605,8 @@ grub_terminfo_getkey (struct grub_term_input *termi)
|
|
|
a4d572 |
return ret;
|
|
|
a4d572 |
}
|
|
|
a4d572 |
|
|
|
a4d572 |
- grub_terminfo_readkey (termi, data->input_buf,
|
|
|
a4d572 |
- &data->npending, data->readkey);
|
|
|
a4d572 |
+ grub_terminfo_readkey (termi, data->input_buf, &data->npending,
|
|
|
a4d572 |
+ GRUB_TERMINFO_READKEY_MAX_LEN, data->readkey);
|
|
|
a4d572 |
|
|
|
a4d572 |
#if defined(__powerpc__) && defined(GRUB_MACHINE_IEEE1275)
|
|
|
a4d572 |
if (data->npending == 1 && data->input_buf[0] == GRUB_TERM_ESC
|
|
|
a4d572 |
--
|
|
|
a4d572 |
2.26.2
|
|
|
a4d572 |
|