Blame SOURCES/0280-font-Fix-size-overflow-in-grub_font_get_glyph_intern.patch

b35c50
From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001
b35c50
From: Zhang Boyang <zhangboyang.id@gmail.com>
b35c50
Date: Fri, 5 Aug 2022 00:51:20 +0800
b35c50
Subject: [PATCH] font: Fix size overflow in grub_font_get_glyph_internal()
b35c50
b35c50
The length of memory allocation and file read may overflow. This patch
b35c50
fixes the problem by using safemath macros.
b35c50
b35c50
There is a lot of code repetition like "(x * y + 7) / 8". It is unsafe
b35c50
if overflow happens. This patch introduces grub_video_bitmap_calc_1bpp_bufsz().
b35c50
It is safe replacement for such code. It has safemath-like prototype.
b35c50
b35c50
This patch also introduces grub_cast(value, pointer), it casts value to
b35c50
typeof(*pointer) then store the value to *pointer. It returns true when
b35c50
overflow occurs or false if there is no overflow. The semantics of arguments
b35c50
and return value are designed to be consistent with other safemath macros.
b35c50
b35c50
Signed-off-by: Zhang Boyang <zhangboyang.id@gmail.com>
b35c50
Reviewed-by: Daniel Kiper <daniel.kiper@oracle.com>
b35c50
(cherry picked from commit 941d10ad6f1dcbd12fb613002249e29ba035f985)
b35c50
---
b35c50
 grub-core/font/font.c   | 17 +++++++++++++----
b35c50
 include/grub/bitmap.h   | 18 ++++++++++++++++++
b35c50
 include/grub/safemath.h |  2 ++
b35c50
 3 files changed, 33 insertions(+), 4 deletions(-)
b35c50
b35c50
diff --git a/grub-core/font/font.c b/grub-core/font/font.c
b35c50
index 2f09a4a55b..6a3fbebbd8 100644
b35c50
--- a/grub-core/font/font.c
b35c50
+++ b/grub-core/font/font.c
b35c50
@@ -739,7 +739,8 @@ grub_font_get_glyph_internal (grub_font_t font, grub_uint32_t code)
b35c50
       grub_int16_t xoff;
b35c50
       grub_int16_t yoff;
b35c50
       grub_int16_t dwidth;
b35c50
-      int len;
b35c50
+      grub_ssize_t len;
b35c50
+      grub_size_t sz;
b35c50
 
b35c50
       if (index_entry->glyph)
b35c50
 	/* Return cached glyph.  */
b35c50
@@ -768,9 +769,17 @@ grub_font_get_glyph_internal (grub_font_t font, grub_uint32_t code)
b35c50
 	  return 0;
b35c50
 	}
b35c50
 
b35c50
-      len = (width * height + 7) / 8;
b35c50
-      glyph = grub_malloc (sizeof (struct grub_font_glyph) + len);
b35c50
-      if (!glyph)
b35c50
+      /* Calculate real struct size of current glyph. */
b35c50
+      if (grub_video_bitmap_calc_1bpp_bufsz (width, height, &len) ||
b35c50
+	  grub_add (sizeof (struct grub_font_glyph), len, &sz))
b35c50
+	{
b35c50
+	  remove_font (font);
b35c50
+	  return 0;
b35c50
+	}
b35c50
+
b35c50
+      /* Allocate and initialize the glyph struct. */
b35c50
+      glyph = grub_malloc (sz);
b35c50
+      if (glyph == NULL)
b35c50
 	{
b35c50
 	  remove_font (font);
b35c50
 	  return 0;
b35c50
diff --git a/include/grub/bitmap.h b/include/grub/bitmap.h
b35c50
index 5728f8ca3a..0d9603f619 100644
b35c50
--- a/include/grub/bitmap.h
b35c50
+++ b/include/grub/bitmap.h
b35c50
@@ -23,6 +23,7 @@
b35c50
 #include <grub/symbol.h>
b35c50
 #include <grub/types.h>
b35c50
 #include <grub/video.h>
b35c50
+#include <grub/safemath.h>
b35c50
 
b35c50
 struct grub_video_bitmap
b35c50
 {
b35c50
@@ -79,6 +80,23 @@ grub_video_bitmap_get_height (struct grub_video_bitmap *bitmap)
b35c50
   return bitmap->mode_info.height;
b35c50
 }
b35c50
 
b35c50
+/*
b35c50
+ * Calculate and store the size of data buffer of 1bit bitmap in result.
b35c50
+ * Equivalent to "*result = (width * height + 7) / 8" if no overflow occurs.
b35c50
+ * Return true when overflow occurs or false if there is no overflow.
b35c50
+ * This function is intentionally implemented as a macro instead of
b35c50
+ * an inline function. Although a bit awkward, it preserves data types for
b35c50
+ * safemath macros and reduces macro side effects as much as possible.
b35c50
+ *
b35c50
+ * XXX: Will report false overflow if width * height > UINT64_MAX.
b35c50
+ */
b35c50
+#define grub_video_bitmap_calc_1bpp_bufsz(width, height, result) \
b35c50
+({ \
b35c50
+  grub_uint64_t _bitmap_pixels; \
b35c50
+  grub_mul ((width), (height), &_bitmap_pixels) ? 1 : \
b35c50
+    grub_cast (_bitmap_pixels / GRUB_CHAR_BIT + !!(_bitmap_pixels % GRUB_CHAR_BIT), (result)); \
b35c50
+})
b35c50
+
b35c50
 void EXPORT_FUNC (grub_video_bitmap_get_mode_info) (struct grub_video_bitmap *bitmap,
b35c50
 						    struct grub_video_mode_info *mode_info);
b35c50
 
b35c50
diff --git a/include/grub/safemath.h b/include/grub/safemath.h
b35c50
index c17b89bba1..bb0f826de1 100644
b35c50
--- a/include/grub/safemath.h
b35c50
+++ b/include/grub/safemath.h
b35c50
@@ -30,6 +30,8 @@
b35c50
 #define grub_sub(a, b, res)	__builtin_sub_overflow(a, b, res)
b35c50
 #define grub_mul(a, b, res)	__builtin_mul_overflow(a, b, res)
b35c50
 
b35c50
+#define grub_cast(a, res)	grub_add ((a), 0, (res))
b35c50
+
b35c50
 #else
b35c50
 #error gcc 5.1 or newer or clang 3.8 or newer is required
b35c50
 #endif