From: Lidong Chen <lidong.c...@oracle.com>

Replace direct arithmetic operations with macros from include/grub/safemath.h
to prevent potential overflow issues when calculating the memory sizes.

Signed-off-by: Lidong Chen <lidong.c...@oracle.com>
Reviewed-by: Daniel Kiper <daniel.ki...@oracle.com>
---
 grub-core/fs/zfs/zfs.c | 50 ++++++++++++++++++++++++++++++++++++++++++++------
 1 file changed, 44 insertions(+), 6 deletions(-)

diff --git a/grub-core/fs/zfs/zfs.c b/grub-core/fs/zfs/zfs.c
index 22ced4014..c77ab7ad3 100644
--- a/grub-core/fs/zfs/zfs.c
+++ b/grub-core/fs/zfs/zfs.c
@@ -2427,6 +2427,7 @@ fzap_iterate (dnode_end_t * zap_dnode, zap_phys_t * zap,
                                            zap_dnode->endian) << DNODE_SHIFT);
   grub_err_t err;
   grub_zfs_endian_t endian;
+  grub_size_t sz;
 
   if (zap_verify (zap, zap_dnode->endian))
     return 0;
@@ -2488,8 +2489,14 @@ fzap_iterate (dnode_end_t * zap_dnode, zap_phys_t * zap,
          if (le->le_type != ZAP_CHUNK_ENTRY)
            continue;
 
-         buf = grub_malloc (grub_zfs_to_cpu16 (le->le_name_length, endian)
-                            * name_elem_length + 1);
+         if (grub_mul (grub_zfs_to_cpu16 (le->le_name_length, endian), 
name_elem_length, &sz) ||
+             grub_add (sz, 1, &sz))
+           {
+             grub_error (GRUB_ERR_OUT_OF_RANGE, N_("buffer size overflow"));
+             grub_free (l);
+             return grub_errno;
+           }
+         buf = grub_malloc (sz);
          if (zap_leaf_array_get (l, endian, blksft,
                                  grub_zfs_to_cpu16 (le->le_name_chunk,
                                                     endian),
@@ -2912,6 +2919,7 @@ dnode_get_path (struct subvolume *subvol, const char 
*path_in, dnode_end_t *dn,
          && ((grub_zfs_to_cpu64(((znode_phys_t *) DN_BONUS 
(&dnode_path->dn.dn))->zp_mode, dnode_path->dn.endian) >> 12) & 0xf) == 0xa)
        {
          char *sym_value;
+         grub_size_t sz;
          grub_size_t sym_sz;
          int free_symval = 0;
          char *oldpath = path, *oldpathbuf = path_buf;
@@ -2963,7 +2971,18 @@ dnode_get_path (struct subvolume *subvol, const char 
*path_in, dnode_end_t *dn,
                  break;
              free_symval = 1;
            }
-         path = path_buf = grub_malloc (sym_sz + grub_strlen (oldpath) + 1);
+
+         if (grub_add (sym_sz, grub_strlen (oldpath), &sz) ||
+             grub_add (sz, 1, &sz))
+           {
+             grub_error (GRUB_ERR_OUT_OF_RANGE, N_("path buffer size 
overflow"));
+             grub_free (oldpathbuf);
+             if (free_symval)
+               grub_free (sym_value);
+             err = grub_errno;
+             break;
+           }
+         path = path_buf = grub_malloc (sz);
          if (!path_buf)
            {
              grub_free (oldpathbuf);
@@ -3000,6 +3019,7 @@ dnode_get_path (struct subvolume *subvol, const char 
*path_in, dnode_end_t *dn,
        {
          void *sahdrp;
          int hdrsize;
+         grub_size_t sz;
 
          if (dnode_path->dn.dn.dn_bonuslen != 0)
            {
@@ -3033,7 +3053,15 @@ dnode_get_path (struct subvolume *subvol, const char 
*path_in, dnode_end_t *dn,
                                                         + SA_SIZE_OFFSET),
                                   dnode_path->dn.endian);
              char *oldpath = path, *oldpathbuf = path_buf;
-             path = path_buf = grub_malloc (sym_sz + grub_strlen (oldpath) + 
1);
+             if (grub_add (sym_sz, grub_strlen (oldpath), &sz) ||
+                 grub_add (sz, 1, &sz))
+               {
+                 grub_error (GRUB_ERR_OUT_OF_RANGE, N_("path buffer size 
overflow"));
+                 grub_free (oldpathbuf);
+                 err = grub_errno;
+                 break;
+               }
+             path = path_buf = grub_malloc (sz);
              if (!path_buf)
                {
                  grub_free (oldpathbuf);
@@ -3608,6 +3636,7 @@ grub_zfs_nvlist_lookup_nvlist_array (const char *nvlist, 
const char *name,
   unsigned i;
   grub_size_t nelm;
   int elemsize = 0;
+  int sz;
 
   found = nvlist_find_value (nvlist, name, DATA_TYPE_NVLIST_ARRAY, &nvpair,
                             &size, &nelm);
@@ -3642,7 +3671,12 @@ grub_zfs_nvlist_lookup_nvlist_array (const char *nvlist, 
const char *name,
       return 0;
     }
 
-  ret = grub_zalloc (elemsize + sizeof (grub_uint32_t));
+  if (grub_add (elemsize, sizeof (grub_uint32_t), &sz))
+    {
+      grub_error (GRUB_ERR_OUT_OF_RANGE, N_("elemsize overflow"));
+      return 0;
+    }
+  ret = grub_zalloc (sz);
   if (!ret)
     return 0;
   grub_memcpy (ret, nvlist, sizeof (grub_uint32_t));
@@ -4233,6 +4267,7 @@ iterate_zap_snap (const char *name, grub_uint64_t val,
   struct grub_dirhook_info info;
   char *name2;
   int ret;
+  grub_size_t sz;
 
   dnode_end_t mdn;
 
@@ -4253,7 +4288,10 @@ iterate_zap_snap (const char *name, grub_uint64_t val,
       return 0;
     }
 
-  name2 = grub_malloc (grub_strlen (name) + 2);
+  if (grub_add (grub_strlen (name), 2, &sz))
+    return grub_error (GRUB_ERR_OUT_OF_RANGE, N_("name length overflow"));
+
+  name2 = grub_malloc (sz);
   name2[0] = '@';
   grub_memcpy (name2 + 1, name, grub_strlen (name) + 1);
   ret = ctx->hook (name2, &info, ctx->hook_data);
-- 
2.11.0


_______________________________________________
Grub-devel mailing list
Grub-devel@gnu.org
https://lists.gnu.org/mailman/listinfo/grub-devel

Reply via email to