42b3050a74
CVE-2022-28736 CVE-2022-28735 CVE-2022-28734 CVE-2022-28733 CVE-2021-3697 CVE-2021-3696 CVE-2021-3695 Resolves: #2070688 Signed-off-by: Robbie Harwood <rharwood@redhat.com>
37 lines
1.4 KiB
Diff
37 lines
1.4 KiB
Diff
From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001
|
|
From: Daniel Axtens <dja@axtens.net>
|
|
Date: Tue, 18 Jan 2022 14:29:20 +1100
|
|
Subject: [PATCH] net/tftp: Avoid a trivial UAF
|
|
|
|
Under tftp errors, we print a tftp error message from the tftp header.
|
|
However, the tftph pointer is a pointer inside nb, the netbuff. Previously,
|
|
we were freeing the nb and then dereferencing it. Don't do that, use it
|
|
and then free it later.
|
|
|
|
This isn't really _bad_ per se, especially as we're single-threaded, but
|
|
it trips up fuzzers.
|
|
|
|
Signed-off-by: Daniel Axtens <dja@axtens.net>
|
|
Reviewed-by: Daniel Kiper <daniel.kiper@oracle.com>
|
|
(cherry picked from commit 956f4329cec23e4375182030ca9b2be631a61ba5)
|
|
(cherry picked from commit dbe9abcdee6ce796811111b67e3f24eefe2135d1)
|
|
---
|
|
grub-core/net/tftp.c | 2 +-
|
|
1 file changed, 1 insertion(+), 1 deletion(-)
|
|
|
|
diff --git a/grub-core/net/tftp.c b/grub-core/net/tftp.c
|
|
index 788ad1dc44..a95766dcbd 100644
|
|
--- a/grub-core/net/tftp.c
|
|
+++ b/grub-core/net/tftp.c
|
|
@@ -251,9 +251,9 @@ tftp_receive (grub_net_udp_socket_t sock __attribute__ ((unused)),
|
|
return GRUB_ERR_NONE;
|
|
case TFTP_ERROR:
|
|
data->have_oack = 1;
|
|
- grub_netbuff_free (nb);
|
|
grub_error (GRUB_ERR_IO, "%s", tftph->u.err.errmsg);
|
|
grub_error_save (&data->save_err);
|
|
+ grub_netbuff_free (nb);
|
|
return GRUB_ERR_NONE;
|
|
default:
|
|
grub_netbuff_free (nb);
|