be3181b1eb
- VUL-0: grub2,shim: implement new SBAT method (bsc#1182057) * 0031-util-mkimage-Remove-unused-code-to-add-BSS-section.patch * 0032-util-mkimage-Use-grub_host_to_target32-instead-of-gr.patch * 0033-util-mkimage-Always-use-grub_host_to_target32-to-ini.patch * 0034-util-mkimage-Unify-more-of-the-PE32-and-PE32-header-.patch * 0035-util-mkimage-Reorder-PE-optional-header-fields-set-u.patch * 0036-util-mkimage-Improve-data_size-value-calculation.patch * 0037-util-mkimage-Refactor-section-setup-to-use-a-helper.patch * 0038-util-mkimage-Add-an-option-to-import-SBAT-metadata-i.patch * 0039-grub-install-common-Add-sbat-option.patch - Fix CVE-2021-20225 (bsc#1182262) * 0022-lib-arg-Block-repeated-short-options-that-require-an.patch - Fix CVE-2020-27749 (bsc#1179264) * 0024-kern-parser-Fix-resource-leak-if-argc-0.patch * 0025-kern-parser-Fix-a-memory-leak.patch * 0026-kern-parser-Introduce-process_char-helper.patch * 0027-kern-parser-Introduce-terminate_arg-helper.patch * 0028-kern-parser-Refactor-grub_parser_split_cmdline-clean.patch * 0029-kern-buffer-Add-variable-sized-heap-buffer.patch * 0030-kern-parser-Fix-a-stack-buffer-overflow.patch - Fix CVE-2021-20233 (bsc#1182263) * 0023-commands-menuentry-Fix-quoting-in-setparams_prefix.patch - Fix CVE-2020-25647 (bsc#1177883) * 0021-usb-Avoid-possible-out-of-bound-accesses-caused-by-m.patch - Fix CVE-2020-25632 (bsc#1176711) * 0020-dl-Only-allow-unloading-modules-that-are-not-depende.patch - Fix CVE-2020-27779, CVE-2020-14372 (bsc#1179265) (bsc#1175970) * 0001-include-grub-i386-linux.h-Include-missing-grub-types.patch * 0002-efi-Make-shim_lock-GUID-and-protocol-type-public.patch * 0003-efi-Return-grub_efi_status_t-from-grub_efi_get_varia.patch OBS-URL: https://build.opensuse.org/request/show/876326 OBS-URL: https://build.opensuse.org/package/show/Base:System/grub2?expand=0&rev=374
50 lines
1.8 KiB
Diff
50 lines
1.8 KiB
Diff
From 805d58de7a06687572fba8f8d0f4110204246f2d Mon Sep 17 00:00:00 2001
|
|
From: Peter Jones <pjones@redhat.com>
|
|
Date: Thu, 11 Feb 2021 17:07:33 +0100
|
|
Subject: [PATCH 36/46] util/mkimage: Improve data_size value calculation
|
|
|
|
According to "Microsoft Portable Executable and Common Object File Format
|
|
Specification", the Optional Header SizeOfInitializedData field contains:
|
|
|
|
Size of the initialized data section, or the sum of all such sections if
|
|
there are multiple data sections.
|
|
|
|
Make this explicit by adding the GRUB kernel data size to the sum of all
|
|
the modules sizes. The ALIGN_UP() is not required by the PE spec but do
|
|
it to avoid alignment issues.
|
|
|
|
Signed-off-by: Peter Jones <pjones@redhat.com>
|
|
Signed-off-by: Javier Martinez Canillas <javierm@redhat.com>
|
|
Reviewed-by: Daniel Kiper <daniel.kiper@oracle.com>
|
|
---
|
|
util/mkimage.c | 6 +++++-
|
|
1 file changed, 5 insertions(+), 1 deletion(-)
|
|
|
|
diff --git a/util/mkimage.c b/util/mkimage.c
|
|
index deaef5666..853a52179 100644
|
|
--- a/util/mkimage.c
|
|
+++ b/util/mkimage.c
|
|
@@ -1260,6 +1260,7 @@ grub_install_generate_image (const char *dir, const char *prefix,
|
|
void *pe_img;
|
|
grub_uint8_t *header;
|
|
void *sections;
|
|
+ size_t scn_size;
|
|
size_t pe_size;
|
|
struct grub_pe32_coff_header *c;
|
|
struct grub_pe32_section_table *text_section, *data_section;
|
|
@@ -1362,7 +1363,10 @@ grub_install_generate_image (const char *dir, const char *prefix,
|
|
| GRUB_PE32_SCN_MEM_EXECUTE
|
|
| GRUB_PE32_SCN_MEM_READ);
|
|
|
|
- PE_OHDR (o32, o64, data_size) = grub_host_to_target32 (reloc_addr - layout.exec_size - header_size);
|
|
+ scn_size = ALIGN_UP (layout.kernel_size - layout.exec_size, GRUB_PE32_FILE_ALIGNMENT);
|
|
+ PE_OHDR (o32, o64, data_size) = grub_host_to_target32 (scn_size +
|
|
+ ALIGN_UP (total_module_size,
|
|
+ GRUB_PE32_FILE_ALIGNMENT));
|
|
|
|
data_section = text_section + 1;
|
|
strcpy (data_section->name, ".data");
|
|
--
|
|
2.26.2
|
|
|