]> git.ipfire.org Git - thirdparty/grub.git/commitdiff
video/readers/jpeg: Catch OOB reads/writes in grub_jpeg_decode_du()
authorDaniel Axtens <dja@axtens.net>
Fri, 15 Jan 2021 02:29:53 +0000 (13:29 +1100)
committerDaniel Kiper <daniel.kiper@oracle.com>
Tue, 2 Mar 2021 14:54:18 +0000 (15:54 +0100)
The key line is:

  du[jpeg_zigzag_order[pos]] = val * (int) data->quan_table[qt][pos];

jpeg_zigzag_order is grub_uint8_t[64].

I don't understand JPEG decoders quite well enough to explain what's
going on here. However, I observe sometimes pos=64, which leads to an
OOB read of the jpeg_zigzag_order global then an OOB write to du.
That leads to various unpleasant memory corruption conditions.

Catch where pos >= ARRAY_SIZE(jpeg_zigzag_order) and bail.

Signed-off-by: Daniel Axtens <dja@axtens.net>
Reviewed-by: Daniel Kiper <daniel.kiper@oracle.com>
grub-core/video/readers/jpeg.c

index 23f919aa07076944b2b0d5ab6261790afcf7d22c..e5148120f69b2d5429fb660019198b14aac7ac68 100644 (file)
@@ -526,6 +526,14 @@ grub_jpeg_decode_du (struct grub_jpeg_data *data, int id, jpeg_data_unit_t du)
       val = grub_jpeg_get_number (data, num & 0xF);
       num >>= 4;
       pos += num;
+
+      if (pos >= ARRAY_SIZE (jpeg_zigzag_order))
+       {
+         grub_error (GRUB_ERR_BAD_FILE_TYPE,
+                     "jpeg: invalid position in zigzag order!?");
+         return;
+       }
+
       du[jpeg_zigzag_order[pos]] = val * (int) data->quan_table[qt][pos];
       pos++;
     }