Files
rpi-buildroot/boot/edk2/0001-NetworkPkg-IScsiDxe-Fix-for-out-of-bound-memory-acce.patch
Julien Olivain 4c3660a215 boot/edk2: add security fix for CVE-2024-38805
This commit adds a security fix from the upstream commit:
b3a2f7ff24

It fixes CVE-2024-38805:
https://www.cve.org/CVERecord?id=CVE-2024-38805
Note: at the time of this commit, this CVE is "reserved" by a CNA.
Details will come later.

See also the associated pull request:
https://github.com/tianocore/edk2/pull/11042

This commit also adds the corresponding _IGNORE_CVES entry.

Reviewed-by: Romain Naour <romain.naour@smile.fr>
Signed-off-by: Julien Olivain <ju.o@free.fr>
(cherry picked from commit 14d07d1914)
Signed-off-by: Thomas Perale <thomas.perale@mind.be>
2025-07-03 09:52:22 +02:00

76 lines
2.7 KiB
Diff

From 0a3b2a29b96b11fb858974044359c806c6b0a111 Mon Sep 17 00:00:00 2001
From: Santhosh Kumar V <santhoshkumarv@ami.com>
Date: Wed, 7 May 2025 18:53:30 +0530
Subject: [PATCH] NetworkPkg/IScsiDxe:Fix for out of bound memory access for
bz4207 (CVE-2024-38805)
In IScsiBuildKeyValueList, check if we have any data left (Len > 0) before advancing the Data pointer and reducing Len.
Avoids wrapping Len. Also Used SafeUint32SubSafeUint32Sub call to reduce the Len .
Upstream: https://github.com/tianocore/edk2/commit/b3a2f7ff24e156e8c4d694fffff01e95a048c536
Signed-off-by: santhosh kumar V <santhoshkumarv@ami.com>
Signed-off-by: Julien Olivain <ju.o@free.fr>
---
NetworkPkg/IScsiDxe/IScsiProto.c | 29 ++++++++++++++++++++++++-----
1 file changed, 24 insertions(+), 5 deletions(-)
diff --git a/NetworkPkg/IScsiDxe/IScsiProto.c b/NetworkPkg/IScsiDxe/IScsiProto.c
index ef587649a0..53a0ff801d 100644
--- a/NetworkPkg/IScsiDxe/IScsiProto.c
+++ b/NetworkPkg/IScsiDxe/IScsiProto.c
@@ -1880,6 +1880,8 @@ IScsiBuildKeyValueList (
{
LIST_ENTRY *ListHead;
ISCSI_KEY_VALUE_PAIR *KeyValuePair;
+ EFI_STATUS Status;
+ UINT32 Result;
ListHead = AllocatePool (sizeof (LIST_ENTRY));
if (ListHead == NULL) {
@@ -1903,9 +1905,14 @@ IScsiBuildKeyValueList (
Data++;
}
- if (*Data == '=') {
+ // Here Len must not be zero.
+ // The value of Len is size of data buffer. Actually, Data is make up of strings.
+ // AuthMethod=None\0TargetAlias=LIO Target\0 TargetPortalGroupTag=1\0
+ // (1) Len == 0, *Data != '=' goto ON_ERROR
+ // (2) *Data == '=', Len != 0 normal case.
+ // (3) *Data == '=', Len == 0, Between Data and Len are mismatch, Len isn't all size of data, as error.
+ if ((Len > 0) && (*Data == '=')) {
*Data = '\0';
-
Data++;
Len--;
} else {
@@ -1915,10 +1922,22 @@ IScsiBuildKeyValueList (
KeyValuePair->Value = Data;
- InsertTailList (ListHead, &KeyValuePair->List);
+ Status = SafeUint32Add ((UINT32)AsciiStrLen (KeyValuePair->Value), 1, &Result);
+ if (EFI_ERROR (Status)) {
+ DEBUG ((DEBUG_ERROR, "%a Memory Overflow is Detected.\n", __func__));
+ FreePool (KeyValuePair);
+ goto ON_ERROR;
+ }
- Data += AsciiStrLen (KeyValuePair->Value) + 1;
- Len -= (UINT32)AsciiStrLen (KeyValuePair->Value) + 1;
+ Status = SafeUint32Sub (Len, Result, &Len);
+ if (EFI_ERROR (Status)) {
+ DEBUG ((DEBUG_ERROR, "%a Out of bound memory access Detected.\n", __func__));
+ FreePool (KeyValuePair);
+ goto ON_ERROR;
+ }
+
+ InsertTailList (ListHead, &KeyValuePair->List);
+ Data += Result;
}
return ListHead;
--
2.49.0