]> git.ipfire.org Git - thirdparty/grub.git/commit
usb: Avoid possible out-of-bound accesses caused by malicious devices
authorJavier Martinez Canillas <javierm@redhat.com>
Fri, 11 Dec 2020 18:19:21 +0000 (19:19 +0100)
committerDaniel Kiper <daniel.kiper@oracle.com>
Tue, 2 Mar 2021 14:54:15 +0000 (15:54 +0100)
commit128c16a682034263eb519c89bc0934eeb6fa8cfa
tree5a843d060044ae12a0883cba79c6b5b36a272bb8
parent7630ec5397fe418276b360f9011934b8c034936c
usb: Avoid possible out-of-bound accesses caused by malicious devices

The maximum number of configurations and interfaces are fixed but there is
no out-of-bound checking to prevent a malicious USB device to report large
values for these and cause accesses outside the arrays' memory.

Fixes: CVE-2020-25647
Reported-by: Joseph Tartaro <joseph.tartaro@ioactive.com>
Reported-by: Ilja Van Sprundel <ivansprundel@ioactive.com>
Signed-off-by: Javier Martinez Canillas <javierm@redhat.com>
Reviewed-by: Daniel Kiper <daniel.kiper@oracle.com>
grub-core/bus/usb/usb.c
include/grub/usb.h