mirror of
git://git.yoctoproject.org/poky
synced 2026-04-02 02:49:11 +00:00
CVE: CVE-2023-4692 Crafted file system images can cause heap-based buffer overflow and may allow arbitrary code execution and secure boot bypass. Upstream-Status: Backport [https://git.savannah.gnu.org/cgit/grub.git/commit/?id=43651027d24e62a7a463254165e1e46e42aecdea] CVE: CVE-2023-4693 There an out-of-bounds read at fs/ntfs.c, a physically present attacker may leverage that by presenting a specially crafted NTFS file system image to read arbitrary memory locations. A successful attack may allow sensitive data cached in memory or EFI variables values to be leaked presenting a high Confidentiality risk. Upstream-Status: Backport [https://git.savannah.gnu.org/cgit/grub.git/commit/?id=0ed2458cc4eff6d9a9199527e2a0b6d445802f94] (From OE-Core rev: 51236150a3740d95e3601499d3918af5a37f8f86) Signed-off-by: Xiangyu Chen <xiangyu.chen@windriver.com> Signed-off-by: Alexandre Belloni <alexandre.belloni@bootlin.com> (cherry picked from commit: a8bc6f041599ce8da275c163c87f155a2f09369c) Signed-off-by: Xiangyu Chen <xiangyu.chen@windriver.com> Signed-off-by: Steve Sakoman <steve@sakoman.com>
108 lines
4.8 KiB
PHP
108 lines
4.8 KiB
PHP
SUMMARY = "GRUB2 is the next-generation GRand Unified Bootloader"
|
|
|
|
DESCRIPTION = "GRUB2 is the next generaion of a GPLed bootloader \
|
|
intended to unify bootloading across x86 operating systems. In \
|
|
addition to loading the Linux kernel, it implements the Multiboot \
|
|
standard, which allows for flexible loading of multiple boot images."
|
|
|
|
HOMEPAGE = "http://www.gnu.org/software/grub/"
|
|
SECTION = "bootloaders"
|
|
|
|
LICENSE = "GPL-3.0-only"
|
|
LIC_FILES_CHKSUM = "file://COPYING;md5=d32239bcb673463ab874e80d47fae504"
|
|
|
|
CVE_PRODUCT = "grub2"
|
|
|
|
SRC_URI = "${GNU_MIRROR}/grub/grub-${PV}.tar.gz \
|
|
file://0001-Disable-mfpmath-sse-as-well-when-SSE-is-disabled.patch \
|
|
file://autogen.sh-exclude-pc.patch \
|
|
file://grub-module-explicitly-keeps-symbole-.module_license.patch \
|
|
file://0001-grub.d-10_linux.in-add-oe-s-kernel-name.patch \
|
|
file://determinism.patch \
|
|
file://0001-RISC-V-Restore-the-typcast-to-long.patch \
|
|
file://CVE-2021-3981-grub-mkconfig-Restore-umask-for-the-grub.cfg.patch \
|
|
file://0001-configure.ac-Use-_zicsr_zifencei-extentions-on-riscv.patch \
|
|
file://video-Remove-trailing-whitespaces.patch \
|
|
file://CVE-2021-3695-video-readers-png-Drop-greyscale-support-to-fix-heap.patch \
|
|
file://CVE-2021-3696-video-readers-png-Avoid-heap-OOB-R-W-inserting-huff.patch \
|
|
file://video-readers-jpeg-Abort-sooner-if-a-read-operation-.patch \
|
|
file://video-readers-jpeg-Refuse-to-handle-multiple-start-o.patch \
|
|
file://CVE-2021-3697-video-readers-jpeg-Block-int-underflow-wild-pointer.patch \
|
|
file://CVE-2022-28733-net-ip-Do-IP-fragment-maths-safely.patch \
|
|
file://CVE-2022-28734-net-http-Fix-OOB-write-for-split-http-headers.patch \
|
|
file://CVE-2022-28734-net-http-Error-out-on-headers-with-LF-without-CR.patch \
|
|
file://CVE-2022-28735-kern-efi-sb-Reject-non-kernel-files-in-the-shim_lock.patch \
|
|
file://0001-configure-Remove-obsoleted-malign-jumps-loops-functi.patch \
|
|
file://0002-configure-Check-for-falign-jumps-1-beside-falign-loo.patch \
|
|
file://loader-efi-chainloader-Simplify-the-loader-state.patch \
|
|
file://commands-boot-Add-API-to-pass-context-to-loader.patch \
|
|
file://CVE-2022-28736-loader-efi-chainloader-Use-grub_loader_set_ex.patch\
|
|
file://0001-font-Fix-size-overflow-in-grub_font_get_glyph_intern.patch \
|
|
file://CVE-2022-2601.patch \
|
|
file://CVE-2022-3775.patch \
|
|
file://0001-risc-v-Handle-R_RISCV_CALL_PLT-reloc.patch \
|
|
file://0001-fs-ext2-Ignore-checksum-seed-incompat-feature.patch \
|
|
file://CVE-2023-4692.patch \
|
|
file://CVE-2023-4693.patch \
|
|
"
|
|
|
|
SRC_URI[sha256sum] = "23b64b4c741569f9426ed2e3d0e6780796fca081bee4c99f62aa3f53ae803f5f"
|
|
|
|
# Applies only to RHEL
|
|
CVE_CHECK_IGNORE += "CVE-2019-14865"
|
|
# Applies only to SUSE
|
|
CVE_CHECK_IGNORE += "CVE-2021-46705"
|
|
|
|
DEPENDS = "flex-native bison-native gettext-native"
|
|
|
|
GRUB_COMPATIBLE_HOST = '(x86_64.*|i.86.*|arm.*|aarch64.*|riscv.*)-(linux.*|freebsd.*)'
|
|
COMPATIBLE_HOST = "${GRUB_COMPATIBLE_HOST}"
|
|
# Grub doesn't support hard float toolchain and won't be able to forcefully
|
|
# disable it on some of the target CPUs. See 'configure.ac' for
|
|
# supported/unsupported CPUs in hardfp.
|
|
COMPATIBLE_HOST:armv7a = "${@'null' if bb.utils.contains('TUNE_CCARGS_MFLOAT', 'hard', True, False, d) else d.getVar('GRUB_COMPATIBLE_HOST')}"
|
|
COMPATIBLE_HOST:armv7ve = "${@'null' if bb.utils.contains('TUNE_CCARGS_MFLOAT', 'hard', True, False, d) else d.getVar('GRUB_COMPATIBLE_HOST')}"
|
|
|
|
# configure.ac has code to set this automagically from the target tuple
|
|
# but the OE freeform one (core2-foo-bar-linux) don't work with that.
|
|
|
|
GRUBPLATFORM:arm = "efi"
|
|
GRUBPLATFORM:aarch64 = "efi"
|
|
GRUBPLATFORM:riscv32 = "efi"
|
|
GRUBPLATFORM:riscv64 = "efi"
|
|
GRUBPLATFORM ??= "pc"
|
|
|
|
inherit autotools gettext texinfo pkgconfig
|
|
|
|
CFLAGS:remove = "-O2"
|
|
|
|
EXTRA_OECONF = "--with-platform=${GRUBPLATFORM} \
|
|
--disable-grub-mkfont \
|
|
--program-prefix="" \
|
|
--enable-liblzma=no \
|
|
--enable-libzfs=no \
|
|
--enable-largefile \
|
|
--disable-werror \
|
|
"
|
|
|
|
PACKAGECONFIG ??= ""
|
|
PACKAGECONFIG[grub-mount] = "--enable-grub-mount,--disable-grub-mount,fuse"
|
|
PACKAGECONFIG[device-mapper] = "--enable-device-mapper,--disable-device-mapper,libdevmapper"
|
|
|
|
# grub2 creates its own set of -nostdinc / -isystem / -ffreestanding CFLAGS and
|
|
# OE's default BUILD_CFLAGS (assigned to CFLAGS for native builds) etc, conflict
|
|
# with that. Note that since BUILD_CFLAGS etc are not used by grub2 target
|
|
# builds, it's safe to clear them unconditionally for both target and native.
|
|
BUILD_CPPFLAGS = ""
|
|
BUILD_CFLAGS = ""
|
|
BUILD_CXXFLAGS = ""
|
|
BUILD_LDFLAGS = ""
|
|
|
|
export PYTHON = "python3"
|
|
|
|
do_configure:prepend() {
|
|
cd ${S}
|
|
FROM_BOOTSTRAP=1 ${S}/autogen.sh
|
|
cd ${B}
|
|
}
|