Peter Jones 3f05d693d1 malloc: Use overflow checking primitives where we do complex allocations
This attempts to fix the places where we do the following where
arithmetic_expr may include unvalidated data:

  X = grub_malloc(arithmetic_expr);

It accomplishes this by doing the arithmetic ahead of time using grub_add(),
grub_sub(), grub_mul() and testing for overflow before proceeding.

Among other issues, this fixes:
  - allocation of integer overflow in grub_video_bitmap_create()
    reported by Chris Coulson,
  - allocation of integer overflow in grub_png_decode_image_header()
    reported by Chris Coulson,
  - allocation of integer overflow in grub_squash_read_symlink()
    reported by Chris Coulson,
  - allocation of integer overflow in grub_ext2_read_symlink()
    reported by Chris Coulson,
  - allocation of integer overflow in read_section_as_string()
    reported by Chris Coulson.

Fixes: CVE-2020-14309, CVE-2020-14310, CVE-2020-14311

Signed-off-by: Peter Jones <pjones@redhat.com>
Reviewed-by: Daniel Kiper <daniel.kiper@oracle.com>
2020-07-29 16:55:47 +02:00
..
2011-05-13 16:36:05 +02:00
2017-05-08 20:53:28 +02:00
2019-02-25 14:02:05 +01:00
2010-08-30 00:54:15 +02:00
2020-07-29 16:55:47 +02:00
2020-02-11 21:30:30 +01:00
2019-02-25 11:28:44 +01:00
2016-10-27 16:22:06 +02:00
2020-07-29 16:55:47 +02:00
2011-07-05 20:24:20 +02:00
2019-03-25 15:14:52 +01:00
2012-02-26 18:09:07 +01:00
2018-06-23 21:40:55 +02:00
2013-12-18 05:28:05 +01:00
2016-02-12 12:39:38 +01:00
2019-02-25 14:02:05 +01:00