- Resolves: CVE-2024-45779 CVE-2024-45778 CVE-2025-1118 - Resolves: CVE-2025-0677 CVE-2024-45782 CVE-2025-0690 - Resolves: CVE-2024-45783 CVE-2025-0624 CVE-2024-45776 - Resolves: CVE-2025-0622 CVE-2024-45774 CVE-2024-45775 - Resolves: CVE-2024-45781 CVE-2024-45780 - Resolves: #RHEL-79700 - Resolves: #RHEL-79341 - Resolves: #RHEL-79875 - Resolves: #RHEL-79849 - Resolves: #RHEL-79707 - Resolves: #RHEL-79857 - Resolves: #RHEL-79709 - Resolves: #RHEL-79846 - Resolves: #RHEL-75737 - Resolves: #RHEL-79713 - Resolves: #RHEL-73785 - Resolves: #RHEL-73787 - Resolves: #RHEL-79704 - Resolves: #RHEL-79702 Signed-off-by: Nicolas Frayer <nfrayer@redhat.com>
56 lines
2.0 KiB
Diff
56 lines
2.0 KiB
Diff
From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001
|
|
From: Lidong Chen <lidong.chen@oracle.com>
|
|
Date: Tue, 21 Jan 2025 19:02:39 +0000
|
|
Subject: [PATCH] misc: Ensure consistent overflow error messages
|
|
|
|
Update the overflow error messages to make them consistent
|
|
across the GRUB code.
|
|
|
|
Signed-off-by: Lidong Chen <lidong.chen@oracle.com>
|
|
Reviewed-by: Daniel Kiper <daniel.kiper@oracle.com>
|
|
---
|
|
grub-core/fs/ntfs.c | 2 +-
|
|
grub-core/fs/ntfscomp.c | 2 +-
|
|
grub-core/video/readers/png.c | 2 +-
|
|
3 files changed, 3 insertions(+), 3 deletions(-)
|
|
|
|
diff --git a/grub-core/fs/ntfs.c b/grub-core/fs/ntfs.c
|
|
index 96f038c54..7ebcaf063 100644
|
|
--- a/grub-core/fs/ntfs.c
|
|
+++ b/grub-core/fs/ntfs.c
|
|
@@ -574,7 +574,7 @@ retry:
|
|
goto retry;
|
|
}
|
|
}
|
|
- return grub_error (GRUB_ERR_BAD_FS, "run list overflown");
|
|
+ return grub_error (GRUB_ERR_BAD_FS, "run list overflow");
|
|
}
|
|
ctx->curr_vcn = ctx->next_vcn;
|
|
ctx->next_vcn += read_run_data (run, c1, 0); /* length of current VCN */
|
|
diff --git a/grub-core/fs/ntfscomp.c b/grub-core/fs/ntfscomp.c
|
|
index 4bf95c85d..88594702e 100644
|
|
--- a/grub-core/fs/ntfscomp.c
|
|
+++ b/grub-core/fs/ntfscomp.c
|
|
@@ -30,7 +30,7 @@ static grub_err_t
|
|
decomp_nextvcn (struct grub_ntfs_comp *cc)
|
|
{
|
|
if (cc->comp_head >= cc->comp_tail)
|
|
- return grub_error (GRUB_ERR_BAD_FS, "compression block overflown");
|
|
+ return grub_error (GRUB_ERR_BAD_FS, "compression block overflow");
|
|
if (grub_disk_read
|
|
(cc->disk,
|
|
(cc->comp_table[cc->comp_head].next_lcn -
|
|
diff --git a/grub-core/video/readers/png.c b/grub-core/video/readers/png.c
|
|
index 7f2ba7849..3ff215dd6 100644
|
|
--- a/grub-core/video/readers/png.c
|
|
+++ b/grub-core/video/readers/png.c
|
|
@@ -622,7 +622,7 @@ static grub_err_t
|
|
grub_png_output_byte (struct grub_png_data *data, grub_uint8_t n)
|
|
{
|
|
if (--data->raw_bytes < 0)
|
|
- return grub_error (GRUB_ERR_BAD_FILE_TYPE, "image size overflown");
|
|
+ return grub_error (GRUB_ERR_BAD_FILE_TYPE, "image size overflow");
|
|
|
|
if (data->cur_column == 0)
|
|
{
|