diff options
author | Marta Rybczynska <rybczynska@gmail.com> | 2022-02-18 11:05:10 +0100 |
---|---|---|
committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2022-03-02 00:21:36 +0000 |
commit | 6b514d38b7fb7300a88e4ac7d357673bf3a3178e (patch) | |
tree | 99c218a8effa4d47510b265417b3d9b64b666bee /meta/recipes-bsp/grub/grub2.inc | |
parent | 01eb48b7f5681f2c4a51ae63243a7c7ccdc8435e (diff) | |
download | poky-6b514d38b7fb7300a88e4ac7d357673bf3a3178e.tar.gz |
grub: add a fix for a possible NULL dereference
This fix removes a possible NULL pointer dereference in grub
networking code. It is a part of a security series [1].
[1] https://lists.gnu.org/archive/html/grub-devel/2021-03/msg00007.html
(From OE-Core rev: 5e62b476b541d3803e537f2228a264224b72cf81)
Signed-off-by: Marta Rybczynska <marta.rybczynska@huawei.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'meta/recipes-bsp/grub/grub2.inc')
-rw-r--r-- | meta/recipes-bsp/grub/grub2.inc | 1 |
1 files changed, 1 insertions, 0 deletions
diff --git a/meta/recipes-bsp/grub/grub2.inc b/meta/recipes-bsp/grub/grub2.inc index a06beac5ef..2c0bff8fd0 100644 --- a/meta/recipes-bsp/grub/grub2.inc +++ b/meta/recipes-bsp/grub/grub2.inc | |||
@@ -48,6 +48,7 @@ SRC_URI = "${GNU_MIRROR}/grub/grub-${PV}.tar.gz \ | |||
48 | file://CVE-2020-25632.patch \ | 48 | file://CVE-2020-25632.patch \ |
49 | file://CVE-2020-25647.patch \ | 49 | file://CVE-2020-25647.patch \ |
50 | file://0001-mmap-Fix-memory-leak-when-iterating-over-mapped-memo.patch \ | 50 | file://0001-mmap-Fix-memory-leak-when-iterating-over-mapped-memo.patch \ |
51 | file://0002-net-net-Fix-possible-dereference-to-of-a-NULL-pointe.patch \ | ||
51 | " | 52 | " |
52 | SRC_URI[md5sum] = "5ce674ca6b2612d8939b9e6abed32934" | 53 | SRC_URI[md5sum] = "5ce674ca6b2612d8939b9e6abed32934" |
53 | SRC_URI[sha256sum] = "f10c85ae3e204dbaec39ae22fa3c5e99f0665417e91c2cb49b7e5031658ba6ea" | 54 | SRC_URI[sha256sum] = "f10c85ae3e204dbaec39ae22fa3c5e99f0665417e91c2cb49b7e5031658ba6ea" |