47cf63735c
Resolves: CVE-2020-10713 Resolves: CVE-2020-14308 Resolves: CVE-2020-14309 Resolves: CVE-2020-14310 Resolves: CVE-2020-14311 Resolves: CVE-2020-15705 Resolves: CVE-2020-15706 Resolves: CVE-2020-15707 Signed-off-by: Peter Jones <pjones@redhat.com>
38 lines
1.4 KiB
Diff
38 lines
1.4 KiB
Diff
From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001
|
|
From: Peter Jones <pjones@redhat.com>
|
|
Date: Mon, 20 Jul 2020 12:24:02 -0400
|
|
Subject: [PATCH] Fix const char ** pointers in grub-core/net/bootp.c
|
|
|
|
This will need to get folded back in the right place on the next rebase,
|
|
but it's before "Make grub_strtol() "end" pointers have safer const
|
|
qualifiers" currently, so for now I'm leaving it here instead of merging
|
|
it back with the original patch.
|
|
|
|
Signed-off-by: Peter Jones <pjones@redhat.com>
|
|
---
|
|
grub-core/net/bootp.c | 4 ++--
|
|
1 file changed, 2 insertions(+), 2 deletions(-)
|
|
|
|
diff --git a/grub-core/net/bootp.c b/grub-core/net/bootp.c
|
|
index 5a5ebbfb1aa..2658a0cda4e 100644
|
|
--- a/grub-core/net/bootp.c
|
|
+++ b/grub-core/net/bootp.c
|
|
@@ -365,7 +365,7 @@ grub_net_configure_by_dhcp_ack (const char *name,
|
|
struct grub_net_network_level_interface *inter;
|
|
int mask = -1;
|
|
char server_ip[sizeof ("xxx.xxx.xxx.xxx")];
|
|
- const grub_uint8_t *opt;
|
|
+ const char *opt;
|
|
grub_uint8_t opt_len, overload = 0;
|
|
const char *boot_file = 0, *server_name = 0;
|
|
grub_size_t boot_file_len, server_name_len;
|
|
@@ -572,7 +572,7 @@ grub_net_configure_by_dhcp_ack (const char *name,
|
|
if (opt && opt_len)
|
|
{
|
|
grub_env_set_net_property (name, "vendor_class_identifier", (const char *) opt, opt_len);
|
|
- if (opt && grub_strcmp (opt, "HTTPClient") == 0)
|
|
+ if (opt && grub_strcmp ((char *)opt, "HTTPClient") == 0)
|
|
{
|
|
char *proto, *ip, *pa;
|
|
|