mirror of
git://git.yoctoproject.org/poky.git
synced 2025-07-19 21:09:03 +02:00
grub: patch CVE-2024-45775
Cherry-pick patch mentioning this CVE. (From OE-Core rev: 0ae686de6aefb10d961cd8965dba8a02d1c977c6) Signed-off-by: Peter Marko <peter.marko@siemens.com> Signed-off-by: Steve Sakoman <steve@sakoman.com>
This commit is contained in:
parent
00b1c0f58a
commit
1867cc36c7
38
meta/recipes-bsp/grub/files/CVE-2024-45775.patch
Normal file
38
meta/recipes-bsp/grub/files/CVE-2024-45775.patch
Normal file
|
@ -0,0 +1,38 @@
|
||||||
|
From 05be856a8c3aae41f5df90cab7796ab7ee34b872 Mon Sep 17 00:00:00 2001
|
||||||
|
From: Lidong Chen <lidong.chen@oracle.com>
|
||||||
|
Date: Fri, 22 Nov 2024 06:27:55 +0000
|
||||||
|
Subject: [PATCH] commands/extcmd: Missing check for failed allocation
|
||||||
|
|
||||||
|
The grub_extcmd_dispatcher() calls grub_arg_list_alloc() to allocate
|
||||||
|
a grub_arg_list struct but it does not verify the allocation was successful.
|
||||||
|
In case of failed allocation the NULL state pointer can be accessed in
|
||||||
|
parse_option() through grub_arg_parse() which may lead to a security issue.
|
||||||
|
|
||||||
|
Fixes: CVE-2024-45775
|
||||||
|
|
||||||
|
Reported-by: Nils Langius <nils@langius.de>
|
||||||
|
Signed-off-by: Lidong Chen <lidong.chen@oracle.com>
|
||||||
|
Reviewed-by: Daniel Kiper <daniel.kiper@oracle.com>
|
||||||
|
Reviewed-by: Alec Brown <alec.r.brown@oracle.com>
|
||||||
|
|
||||||
|
CVE: CVE-2024-45775
|
||||||
|
Upstream-Status: Backport [https://git.savannah.gnu.org/cgit/grub.git/commit/?id=05be856a8c3aae41f5df90cab7796ab7ee34b872]
|
||||||
|
Signed-off-by: Peter Marko <peter.marko@siemens.com>
|
||||||
|
---
|
||||||
|
grub-core/commands/extcmd.c | 3 +++
|
||||||
|
1 file changed, 3 insertions(+)
|
||||||
|
|
||||||
|
diff --git a/grub-core/commands/extcmd.c b/grub-core/commands/extcmd.c
|
||||||
|
index 90a5ca24a..c236be13a 100644
|
||||||
|
--- a/grub-core/commands/extcmd.c
|
||||||
|
+++ b/grub-core/commands/extcmd.c
|
||||||
|
@@ -49,6 +49,9 @@ grub_extcmd_dispatcher (struct grub_command *cmd, int argc, char **args,
|
||||||
|
}
|
||||||
|
|
||||||
|
state = grub_arg_list_alloc (ext, argc, args);
|
||||||
|
+ if (state == NULL)
|
||||||
|
+ return grub_errno;
|
||||||
|
+
|
||||||
|
if (grub_arg_parse (ext, argc, args, state, &new_args, &new_argc))
|
||||||
|
{
|
||||||
|
context.state = state;
|
|
@ -25,6 +25,7 @@ SRC_URI = "${GNU_MIRROR}/grub/grub-${PV}.tar.gz \
|
||||||
file://CVE-2024-45783.patch \
|
file://CVE-2024-45783.patch \
|
||||||
file://CVE-2025-0624.patch \
|
file://CVE-2025-0624.patch \
|
||||||
file://CVE-2024-45774.patch \
|
file://CVE-2024-45774.patch \
|
||||||
|
file://CVE-2024-45775.patch \
|
||||||
"
|
"
|
||||||
|
|
||||||
SRC_URI[sha256sum] = "b30919fa5be280417c17ac561bb1650f60cfb80cc6237fa1e2b6f56154cb9c91"
|
SRC_URI[sha256sum] = "b30919fa5be280417c17ac561bb1650f60cfb80cc6237fa1e2b6f56154cb9c91"
|
||||||
|
|
Loading…
Reference in New Issue
Block a user