kern/partition: Add sanity check after grub_strtoul() call
The current code incorrectly assumes that both the input and the values returned by grub_strtoul() are always valid which can lead to potential errors. This fix ensures proper validation to prevent any unintended issues. Fixes: CID 473843 Signed-off-by: Lidong Chen <lidong.chen@oracle.com> Reviewed-by: Daniel Kiper <daniel.kiper@oracle.com>
This commit is contained in:
parent
5b36a5210e
commit
8e6e87e792
@ -125,14 +125,22 @@ grub_partition_probe (struct grub_disk *disk, const char *str)
|
||||
for (ptr = str; *ptr;)
|
||||
{
|
||||
grub_partition_map_t partmap;
|
||||
int num;
|
||||
unsigned long num;
|
||||
const char *partname, *partname_end;
|
||||
|
||||
partname = ptr;
|
||||
while (*ptr && grub_isalpha (*ptr))
|
||||
ptr++;
|
||||
partname_end = ptr;
|
||||
num = grub_strtoul (ptr, &ptr, 0) - 1;
|
||||
|
||||
num = grub_strtoul (ptr, &ptr, 0);
|
||||
if (*ptr != '\0' || num == 0 || num > GRUB_INT_MAX)
|
||||
{
|
||||
grub_error (GRUB_ERR_BAD_NUMBER, N_("invalid partition number"));
|
||||
return 0;
|
||||
}
|
||||
|
||||
num -= 1;
|
||||
|
||||
curpart = 0;
|
||||
/* Use the first partition map type found. */
|
||||
|
||||
Loading…
x
Reference in New Issue
Block a user