CVE-2022-28736 CVE-2022-28735 CVE-2022-28734 CVE-2022-28733 CVE-2021-3697 CVE-2021-3696 CVE-2021-3695 Resolves: #2070688 Signed-off-by: Robbie Harwood <rharwood@redhat.com>
		
			
				
	
	
		
			37 lines
		
	
	
		
			1.4 KiB
		
	
	
	
		
			Diff
		
	
	
	
	
	
			
		
		
	
	
			37 lines
		
	
	
		
			1.4 KiB
		
	
	
	
		
			Diff
		
	
	
	
	
	
| From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001
 | |
| From: Daniel Axtens <dja@axtens.net>
 | |
| Date: Tue, 18 Jan 2022 14:29:20 +1100
 | |
| Subject: [PATCH] net/tftp: Avoid a trivial UAF
 | |
| 
 | |
| Under tftp errors, we print a tftp error message from the tftp header.
 | |
| However, the tftph pointer is a pointer inside nb, the netbuff. Previously,
 | |
| we were freeing the nb and then dereferencing it. Don't do that, use it
 | |
| and then free it later.
 | |
| 
 | |
| This isn't really _bad_ per se, especially as we're single-threaded, but
 | |
| it trips up fuzzers.
 | |
| 
 | |
| Signed-off-by: Daniel Axtens <dja@axtens.net>
 | |
| Reviewed-by: Daniel Kiper <daniel.kiper@oracle.com>
 | |
| (cherry picked from commit 956f4329cec23e4375182030ca9b2be631a61ba5)
 | |
| (cherry picked from commit dbe9abcdee6ce796811111b67e3f24eefe2135d1)
 | |
| ---
 | |
|  grub-core/net/tftp.c | 2 +-
 | |
|  1 file changed, 1 insertion(+), 1 deletion(-)
 | |
| 
 | |
| diff --git a/grub-core/net/tftp.c b/grub-core/net/tftp.c
 | |
| index 788ad1dc44..a95766dcbd 100644
 | |
| --- a/grub-core/net/tftp.c
 | |
| +++ b/grub-core/net/tftp.c
 | |
| @@ -251,9 +251,9 @@ tftp_receive (grub_net_udp_socket_t sock __attribute__ ((unused)),
 | |
|        return GRUB_ERR_NONE;
 | |
|      case TFTP_ERROR:
 | |
|        data->have_oack = 1;
 | |
| -      grub_netbuff_free (nb);
 | |
|        grub_error (GRUB_ERR_IO, "%s", tftph->u.err.errmsg);
 | |
|        grub_error_save (&data->save_err);
 | |
| +      grub_netbuff_free (nb);
 | |
|        return GRUB_ERR_NONE;
 | |
|      default:
 | |
|        grub_netbuff_free (nb);
 |