On 2025-12-02 04:01, Alec Brown wrote:
On Mon, Dec 1, 2025 at 1:52 AM, Avnish Chouhan <[email protected]> wrote:
Adding a check for invalid partition number. grub_strtoul() can fail
in several scenarios like invalid input, overflow, etc will result in
an invalid partition number which could lead to an undefined behavior.

Signed-off-by: Avnish Chouhan <[email protected]>
---
 grub-core/kern/ieee1275/openfw.c | 10 ++++++++++
 1 file changed, 10 insertions(+)

diff --git a/grub-core/kern/ieee1275/openfw.c b/grub-core/kern/ieee1275/openfw.c
index 3b492dd..29bdb72 100644
--- a/grub-core/kern/ieee1275/openfw.c
+++ b/grub-core/kern/ieee1275/openfw.c
@@ -512,8 +512,18 @@ grub_ieee1275_encode_devname (const char *path)
     }
   if (partition && partition[0])
     {
+      grub_errno = GRUB_ERR_NONE;
       unsigned int partno = grub_strtoul (partition, 0, 0);

+      if (grub_errno != GRUB_ERR_NONE)

This check isn't reliable. Please see how grub_strtoul() is handled in commit ac8a37dda (net/http: Allow use of non-standard TCP/IP ports). Even if it is
reverted, the code around grub_strtoul() is fully correct.

Alec Brown

Hi Alec,
Thank you so much!

I'll surly add something similar based on commit ac8a37dda.

Regards,
Avnish Chouhan


_______________________________________________
Grub-devel mailing list
[email protected]
https://lists.gnu.org/mailman/listinfo/grub-devel

Reply via email to