]> git.ipfire.org Git - thirdparty/grub.git/commitdiff
normal/menu: Use safe math to avoid an integer overflow
authorAlec Brown <alec.r.brown@oracle.com>
Tue, 4 Feb 2025 15:11:11 +0000 (15:11 +0000)
committerDaniel Kiper <daniel.kiper@oracle.com>
Thu, 13 Feb 2025 14:45:58 +0000 (15:45 +0100)
The Coverity indicates that the variable current_entry might overflow.
To prevent this use safe math when adding GRUB_MENU_PAGE_SIZE to current_entry.

On the occasion fix limiting condition which was broken.

Fixes: CID 473853
Signed-off-by: Alec Brown <alec.r.brown@oracle.com>
Reviewed-by: Daniel Kiper <daniel.kiper@oracle.com>
grub-core/normal/menu.c

index f24544b278396c1fab16f6f01ebed3408d3a339d..b946c834d899324a777fff29a2fc5fe3b1ab940d 100644 (file)
@@ -32,6 +32,7 @@
 #include <grub/script_sh.h>
 #include <grub/gfxterm.h>
 #include <grub/dl.h>
+#include <grub/safemath.h>
 
 /* Time to delay after displaying an error message about a default/fallback
    entry failing to boot.  */
@@ -751,9 +752,7 @@ run_menu (grub_menu_t menu, int nested, int *auto_boot, int *notify_boot)
 
            case GRUB_TERM_CTRL | 'c':
            case GRUB_TERM_KEY_NPAGE:
-             if (current_entry + GRUB_MENU_PAGE_SIZE < menu->size)
-               current_entry += GRUB_MENU_PAGE_SIZE;
-             else
+             if (grub_add (current_entry, GRUB_MENU_PAGE_SIZE, &current_entry) || current_entry >= menu->size)
                current_entry = menu->size - 1;
              menu_set_chosen_entry (current_entry);
              break;