font: Fix several integer overflows in grub_font_construct_glyph()
This patch fixes several integer overflows in grub_font_construct_glyph(). Glyphs of invalid size, zero or leading to an overflow, are rejected. The inconsistency between "glyph" and "max_glyph_size" when grub_malloc() returns NULL is fixed too. Fixes: CVE-2022-2601 Reported-by: Zhang Boyang <zhangboyang.id@gmail.com> Signed-off-by: Zhang Boyang <zhangboyang.id@gmail.com> Reviewed-by: Daniel Kiper <daniel.kiper@oracle.com>
This commit is contained in:
parent
9c76ec09ae
commit
768e1ef2fc
@ -1517,6 +1517,7 @@ grub_font_construct_glyph (grub_font_t hinted_font,
|
|||||||
struct grub_video_signed_rect bounds;
|
struct grub_video_signed_rect bounds;
|
||||||
static struct grub_font_glyph *glyph = 0;
|
static struct grub_font_glyph *glyph = 0;
|
||||||
static grub_size_t max_glyph_size = 0;
|
static grub_size_t max_glyph_size = 0;
|
||||||
|
grub_size_t cur_glyph_size;
|
||||||
|
|
||||||
ensure_comb_space (glyph_id);
|
ensure_comb_space (glyph_id);
|
||||||
|
|
||||||
@ -1533,29 +1534,33 @@ grub_font_construct_glyph (grub_font_t hinted_font,
|
|||||||
if (!glyph_id->ncomb && !glyph_id->attributes)
|
if (!glyph_id->ncomb && !glyph_id->attributes)
|
||||||
return main_glyph;
|
return main_glyph;
|
||||||
|
|
||||||
if (max_glyph_size < sizeof (*glyph) + (bounds.width * bounds.height + GRUB_CHAR_BIT - 1) / GRUB_CHAR_BIT)
|
if (grub_video_bitmap_calc_1bpp_bufsz (bounds.width, bounds.height, &cur_glyph_size) ||
|
||||||
|
grub_add (sizeof (*glyph), cur_glyph_size, &cur_glyph_size))
|
||||||
|
return main_glyph;
|
||||||
|
|
||||||
|
if (max_glyph_size < cur_glyph_size)
|
||||||
{
|
{
|
||||||
grub_free (glyph);
|
grub_free (glyph);
|
||||||
max_glyph_size = (sizeof (*glyph) + (bounds.width * bounds.height + GRUB_CHAR_BIT - 1) / GRUB_CHAR_BIT) * 2;
|
if (grub_mul (cur_glyph_size, 2, &max_glyph_size))
|
||||||
if (max_glyph_size < 8)
|
max_glyph_size = 0;
|
||||||
max_glyph_size = 8;
|
glyph = max_glyph_size > 0 ? grub_malloc (max_glyph_size) : NULL;
|
||||||
glyph = grub_malloc (max_glyph_size);
|
|
||||||
}
|
}
|
||||||
if (!glyph)
|
if (!glyph)
|
||||||
{
|
{
|
||||||
|
max_glyph_size = 0;
|
||||||
grub_errno = GRUB_ERR_NONE;
|
grub_errno = GRUB_ERR_NONE;
|
||||||
return main_glyph;
|
return main_glyph;
|
||||||
}
|
}
|
||||||
|
|
||||||
grub_memset (glyph, 0, sizeof (*glyph)
|
grub_memset (glyph, 0, cur_glyph_size);
|
||||||
+ (bounds.width * bounds.height
|
|
||||||
+ GRUB_CHAR_BIT - 1) / GRUB_CHAR_BIT);
|
|
||||||
|
|
||||||
glyph->font = main_glyph->font;
|
glyph->font = main_glyph->font;
|
||||||
glyph->width = bounds.width;
|
if (bounds.width == 0 || bounds.height == 0 ||
|
||||||
glyph->height = bounds.height;
|
grub_cast (bounds.width, &glyph->width) ||
|
||||||
glyph->offset_x = bounds.x;
|
grub_cast (bounds.height, &glyph->height) ||
|
||||||
glyph->offset_y = bounds.y;
|
grub_cast (bounds.x, &glyph->offset_x) ||
|
||||||
|
grub_cast (bounds.y, &glyph->offset_y))
|
||||||
|
return main_glyph;
|
||||||
|
|
||||||
if (glyph_id->attributes & GRUB_UNICODE_GLYPH_ATTRIBUTE_MIRROR)
|
if (glyph_id->attributes & GRUB_UNICODE_GLYPH_ATTRIBUTE_MIRROR)
|
||||||
grub_font_blit_glyph_mirror (glyph, main_glyph,
|
grub_font_blit_glyph_mirror (glyph, main_glyph,
|
||||||
|
|||||||
Loading…
x
Reference in New Issue
Block a user