diff options
| author | Xiangyu Chen <xiangyu.chen@windriver.com> | 2022-12-07 11:42:54 +0800 |
|---|---|---|
| committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2022-12-08 10:48:36 +0000 |
| commit | 7967e2aa0c47686f63894f7501e3a36a1757f8bc (patch) | |
| tree | 6beea3d729b485a9e923007f8f7c59d013ea8b4d | |
| parent | cc1c4506bade3b028294efe64d5862ba9be1ad4c (diff) | |
| download | poky-7967e2aa0c47686f63894f7501e3a36a1757f8bc.tar.gz | |
grub: backport patches to fix CVE-2022-28736
(From OE-Core rev: 278e1a0f679be813553b014544314041502a586a)
Signed-off-by: Xiangyu Chen <xiangyu.chen@windriver.com>
Signed-off-by: Alexandre Belloni <alexandre.belloni@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
4 files changed, 386 insertions, 0 deletions
diff --git a/meta/recipes-bsp/grub/files/CVE-2022-28736-loader-efi-chainloader-Use-grub_loader_set_ex.patch b/meta/recipes-bsp/grub/files/CVE-2022-28736-loader-efi-chainloader-Use-grub_loader_set_ex.patch new file mode 100644 index 0000000000..5741e53f42 --- /dev/null +++ b/meta/recipes-bsp/grub/files/CVE-2022-28736-loader-efi-chainloader-Use-grub_loader_set_ex.patch | |||
| @@ -0,0 +1,86 @@ | |||
| 1 | From 04c86e0bb7b58fc2f913f798cdb18934933e532d Mon Sep 17 00:00:00 2001 | ||
| 2 | From: Chris Coulson <chris.coulson@canonical.com> | ||
| 3 | Date: Tue, 5 Apr 2022 11:48:58 +0100 | ||
| 4 | Subject: [PATCH] loader/efi/chainloader: Use grub_loader_set_ex() | ||
| 5 | |||
| 6 | This ports the EFI chainloader to use grub_loader_set_ex() in order to fix | ||
| 7 | a use-after-free bug that occurs when grub_cmd_chainloader() is executed | ||
| 8 | more than once before a boot attempt is performed. | ||
| 9 | |||
| 10 | Fixes: CVE-2022-28736 | ||
| 11 | |||
| 12 | Signed-off-by: Chris Coulson <chris.coulson@canonical.com> | ||
| 13 | Reviewed-by: Daniel Kiper <daniel.kiper@oracle.com> | ||
| 14 | |||
| 15 | Upstream-Status: Backport | ||
| 16 | CVE: CVE-2022-28736 | ||
| 17 | |||
| 18 | Reference to upstream patch: | ||
| 19 | https://git.savannah.gnu.org/cgit/grub.git/commit/?id=04c86e0bb7b58fc2f913f798cdb18934933e532d | ||
| 20 | |||
| 21 | Signed-off-by: Xiangyu Chen <xiangyu.chen@windriver.com> | ||
| 22 | --- | ||
| 23 | grub-core/loader/efi/chainloader.c | 16 +++++++--------- | ||
| 24 | 1 file changed, 7 insertions(+), 9 deletions(-) | ||
| 25 | |||
| 26 | diff --git a/grub-core/loader/efi/chainloader.c b/grub-core/loader/efi/chainloader.c | ||
| 27 | index d1602c89b..7557eb269 100644 | ||
| 28 | --- a/grub-core/loader/efi/chainloader.c | ||
| 29 | +++ b/grub-core/loader/efi/chainloader.c | ||
| 30 | @@ -44,11 +44,10 @@ GRUB_MOD_LICENSE ("GPLv3+"); | ||
| 31 | |||
| 32 | static grub_dl_t my_mod; | ||
| 33 | |||
| 34 | -static grub_efi_handle_t image_handle; | ||
| 35 | - | ||
| 36 | static grub_err_t | ||
| 37 | -grub_chainloader_unload (void) | ||
| 38 | +grub_chainloader_unload (void *context) | ||
| 39 | { | ||
| 40 | + grub_efi_handle_t image_handle = (grub_efi_handle_t) context; | ||
| 41 | grub_efi_loaded_image_t *loaded_image; | ||
| 42 | grub_efi_boot_services_t *b; | ||
| 43 | |||
| 44 | @@ -64,8 +63,9 @@ grub_chainloader_unload (void) | ||
| 45 | } | ||
| 46 | |||
| 47 | static grub_err_t | ||
| 48 | -grub_chainloader_boot (void) | ||
| 49 | +grub_chainloader_boot (void *context) | ||
| 50 | { | ||
| 51 | + grub_efi_handle_t image_handle = (grub_efi_handle_t) context; | ||
| 52 | grub_efi_boot_services_t *b; | ||
| 53 | grub_efi_status_t status; | ||
| 54 | grub_efi_uintn_t exit_data_size; | ||
| 55 | @@ -225,6 +225,7 @@ grub_cmd_chainloader (grub_command_t cmd __attribute__ ((unused)), | ||
| 56 | grub_efi_physical_address_t address = 0; | ||
| 57 | grub_efi_uintn_t pages = 0; | ||
| 58 | grub_efi_char16_t *cmdline = NULL; | ||
| 59 | + grub_efi_handle_t image_handle = NULL; | ||
| 60 | |||
| 61 | if (argc == 0) | ||
| 62 | return grub_error (GRUB_ERR_BAD_ARGUMENT, N_("filename expected")); | ||
| 63 | @@ -405,7 +406,7 @@ grub_cmd_chainloader (grub_command_t cmd __attribute__ ((unused)), | ||
| 64 | efi_call_2 (b->free_pages, address, pages); | ||
| 65 | grub_free (file_path); | ||
| 66 | |||
| 67 | - grub_loader_set (grub_chainloader_boot, grub_chainloader_unload, 0); | ||
| 68 | + grub_loader_set_ex (grub_chainloader_boot, grub_chainloader_unload, image_handle, 0); | ||
| 69 | return 0; | ||
| 70 | |||
| 71 | fail: | ||
| 72 | @@ -423,10 +424,7 @@ grub_cmd_chainloader (grub_command_t cmd __attribute__ ((unused)), | ||
| 73 | efi_call_2 (b->free_pages, address, pages); | ||
| 74 | |||
| 75 | if (image_handle != NULL) | ||
| 76 | - { | ||
| 77 | - efi_call_1 (b->unload_image, image_handle); | ||
| 78 | - image_handle = NULL; | ||
| 79 | - } | ||
| 80 | + efi_call_1 (b->unload_image, image_handle); | ||
| 81 | |||
| 82 | grub_dl_unref (my_mod); | ||
| 83 | |||
| 84 | -- | ||
| 85 | 2.34.1 | ||
| 86 | |||
diff --git a/meta/recipes-bsp/grub/files/commands-boot-Add-API-to-pass-context-to-loader.patch b/meta/recipes-bsp/grub/files/commands-boot-Add-API-to-pass-context-to-loader.patch new file mode 100644 index 0000000000..a2c0530f04 --- /dev/null +++ b/meta/recipes-bsp/grub/files/commands-boot-Add-API-to-pass-context-to-loader.patch | |||
| @@ -0,0 +1,168 @@ | |||
| 1 | From 14ceb3b3ff6db664649138442b6562c114dcf56e Mon Sep 17 00:00:00 2001 | ||
| 2 | From: Chris Coulson <chris.coulson@canonical.com> | ||
| 3 | Date: Tue, 5 Apr 2022 10:58:28 +0100 | ||
| 4 | Subject: [PATCH] commands/boot: Add API to pass context to loader | ||
| 5 | |||
| 6 | Loaders rely on global variables for saving context which is consumed | ||
| 7 | in the boot hook and freed in the unload hook. In the case where a loader | ||
| 8 | command is executed twice, calling grub_loader_set() a second time executes | ||
| 9 | the unload hook, but in some cases this runs when the loader's global | ||
| 10 | context has already been updated, resulting in the updated context being | ||
| 11 | freed and potential use-after-free bugs when the boot hook is subsequently | ||
| 12 | called. | ||
| 13 | |||
| 14 | This adds a new API, grub_loader_set_ex(), which allows a loader to specify | ||
| 15 | context that is passed to its boot and unload hooks. This is an alternative | ||
| 16 | to requiring that loaders call grub_loader_unset() before mutating their | ||
| 17 | global context. | ||
| 18 | |||
| 19 | Signed-off-by: Chris Coulson <chris.coulson@canonical.com> | ||
| 20 | Reviewed-by: Daniel Kiper <daniel.kiper@oracle.com> | ||
| 21 | |||
| 22 | Upstream-Status: Backport | ||
| 23 | |||
| 24 | Reference to upstream patch: | ||
| 25 | https://git.savannah.gnu.org/cgit/grub.git/commit/?id=14ceb3b3ff6db664649138442b6562c114dcf56e | ||
| 26 | |||
| 27 | Signed-off-by: Xiangyu Chen <xiangyu.chen@windriver.com> | ||
| 28 | --- | ||
| 29 | grub-core/commands/boot.c | 66 ++++++++++++++++++++++++++++++++++----- | ||
| 30 | include/grub/loader.h | 5 +++ | ||
| 31 | 2 files changed, 63 insertions(+), 8 deletions(-) | ||
| 32 | |||
| 33 | diff --git a/grub-core/commands/boot.c b/grub-core/commands/boot.c | ||
| 34 | index bbca81e94..61514788e 100644 | ||
| 35 | --- a/grub-core/commands/boot.c | ||
| 36 | +++ b/grub-core/commands/boot.c | ||
| 37 | @@ -27,10 +27,20 @@ | ||
| 38 | |||
| 39 | GRUB_MOD_LICENSE ("GPLv3+"); | ||
| 40 | |||
| 41 | -static grub_err_t (*grub_loader_boot_func) (void); | ||
| 42 | -static grub_err_t (*grub_loader_unload_func) (void); | ||
| 43 | +static grub_err_t (*grub_loader_boot_func) (void *context); | ||
| 44 | +static grub_err_t (*grub_loader_unload_func) (void *context); | ||
| 45 | +static void *grub_loader_context; | ||
| 46 | static int grub_loader_flags; | ||
| 47 | |||
| 48 | +struct grub_simple_loader_hooks | ||
| 49 | +{ | ||
| 50 | + grub_err_t (*boot) (void); | ||
| 51 | + grub_err_t (*unload) (void); | ||
| 52 | +}; | ||
| 53 | + | ||
| 54 | +/* Don't heap allocate this to avoid making grub_loader_set() fallible. */ | ||
| 55 | +static struct grub_simple_loader_hooks simple_loader_hooks; | ||
| 56 | + | ||
| 57 | struct grub_preboot | ||
| 58 | { | ||
| 59 | grub_err_t (*preboot_func) (int); | ||
| 60 | @@ -44,6 +54,29 @@ static int grub_loader_loaded; | ||
| 61 | static struct grub_preboot *preboots_head = 0, | ||
| 62 | *preboots_tail = 0; | ||
| 63 | |||
| 64 | +static grub_err_t | ||
| 65 | +grub_simple_boot_hook (void *context) | ||
| 66 | +{ | ||
| 67 | + struct grub_simple_loader_hooks *hooks; | ||
| 68 | + | ||
| 69 | + hooks = (struct grub_simple_loader_hooks *) context; | ||
| 70 | + return hooks->boot (); | ||
| 71 | +} | ||
| 72 | + | ||
| 73 | +static grub_err_t | ||
| 74 | +grub_simple_unload_hook (void *context) | ||
| 75 | +{ | ||
| 76 | + struct grub_simple_loader_hooks *hooks; | ||
| 77 | + grub_err_t ret; | ||
| 78 | + | ||
| 79 | + hooks = (struct grub_simple_loader_hooks *) context; | ||
| 80 | + | ||
| 81 | + ret = hooks->unload (); | ||
| 82 | + grub_memset (hooks, 0, sizeof (*hooks)); | ||
| 83 | + | ||
| 84 | + return ret; | ||
| 85 | +} | ||
| 86 | + | ||
| 87 | int | ||
| 88 | grub_loader_is_loaded (void) | ||
| 89 | { | ||
| 90 | @@ -110,28 +143,45 @@ grub_loader_unregister_preboot_hook (struct grub_preboot *hnd) | ||
| 91 | } | ||
| 92 | |||
| 93 | void | ||
| 94 | -grub_loader_set (grub_err_t (*boot) (void), | ||
| 95 | - grub_err_t (*unload) (void), | ||
| 96 | - int flags) | ||
| 97 | +grub_loader_set_ex (grub_err_t (*boot) (void *context), | ||
| 98 | + grub_err_t (*unload) (void *context), | ||
| 99 | + void *context, | ||
| 100 | + int flags) | ||
| 101 | { | ||
| 102 | if (grub_loader_loaded && grub_loader_unload_func) | ||
| 103 | - grub_loader_unload_func (); | ||
| 104 | + grub_loader_unload_func (grub_loader_context); | ||
| 105 | |||
| 106 | grub_loader_boot_func = boot; | ||
| 107 | grub_loader_unload_func = unload; | ||
| 108 | + grub_loader_context = context; | ||
| 109 | grub_loader_flags = flags; | ||
| 110 | |||
| 111 | grub_loader_loaded = 1; | ||
| 112 | } | ||
| 113 | |||
| 114 | +void | ||
| 115 | +grub_loader_set (grub_err_t (*boot) (void), | ||
| 116 | + grub_err_t (*unload) (void), | ||
| 117 | + int flags) | ||
| 118 | +{ | ||
| 119 | + grub_loader_set_ex (grub_simple_boot_hook, | ||
| 120 | + grub_simple_unload_hook, | ||
| 121 | + &simple_loader_hooks, | ||
| 122 | + flags); | ||
| 123 | + | ||
| 124 | + simple_loader_hooks.boot = boot; | ||
| 125 | + simple_loader_hooks.unload = unload; | ||
| 126 | +} | ||
| 127 | + | ||
| 128 | void | ||
| 129 | grub_loader_unset(void) | ||
| 130 | { | ||
| 131 | if (grub_loader_loaded && grub_loader_unload_func) | ||
| 132 | - grub_loader_unload_func (); | ||
| 133 | + grub_loader_unload_func (grub_loader_context); | ||
| 134 | |||
| 135 | grub_loader_boot_func = 0; | ||
| 136 | grub_loader_unload_func = 0; | ||
| 137 | + grub_loader_context = 0; | ||
| 138 | |||
| 139 | grub_loader_loaded = 0; | ||
| 140 | } | ||
| 141 | @@ -158,7 +208,7 @@ grub_loader_boot (void) | ||
| 142 | return err; | ||
| 143 | } | ||
| 144 | } | ||
| 145 | - err = (grub_loader_boot_func) (); | ||
| 146 | + err = (grub_loader_boot_func) (grub_loader_context); | ||
| 147 | |||
| 148 | for (cur = preboots_tail; cur; cur = cur->prev) | ||
| 149 | if (! err) | ||
| 150 | diff --git a/include/grub/loader.h b/include/grub/loader.h | ||
| 151 | index b20864282..97f231054 100644 | ||
| 152 | --- a/include/grub/loader.h | ||
| 153 | +++ b/include/grub/loader.h | ||
| 154 | @@ -40,6 +40,11 @@ void EXPORT_FUNC (grub_loader_set) (grub_err_t (*boot) (void), | ||
| 155 | grub_err_t (*unload) (void), | ||
| 156 | int flags); | ||
| 157 | |||
| 158 | +void EXPORT_FUNC (grub_loader_set_ex) (grub_err_t (*boot) (void *context), | ||
| 159 | + grub_err_t (*unload) (void *context), | ||
| 160 | + void *context, | ||
| 161 | + int flags); | ||
| 162 | + | ||
| 163 | /* Unset current loader, if any. */ | ||
| 164 | void EXPORT_FUNC (grub_loader_unset) (void); | ||
| 165 | |||
| 166 | -- | ||
| 167 | 2.34.1 | ||
| 168 | |||
diff --git a/meta/recipes-bsp/grub/files/loader-efi-chainloader-Simplify-the-loader-state.patch b/meta/recipes-bsp/grub/files/loader-efi-chainloader-Simplify-the-loader-state.patch new file mode 100644 index 0000000000..a43025d425 --- /dev/null +++ b/meta/recipes-bsp/grub/files/loader-efi-chainloader-Simplify-the-loader-state.patch | |||
| @@ -0,0 +1,129 @@ | |||
| 1 | From 1469983ebb9674753ad333d37087fb8cb20e1dce Mon Sep 17 00:00:00 2001 | ||
| 2 | From: Chris Coulson <chris.coulson@canonical.com> | ||
| 3 | Date: Tue, 5 Apr 2022 10:02:04 +0100 | ||
| 4 | Subject: [PATCH] loader/efi/chainloader: Simplify the loader state | ||
| 5 | |||
| 6 | The chainloader command retains the source buffer and device path passed | ||
| 7 | to LoadImage(), requiring the unload hook passed to grub_loader_set() to | ||
| 8 | free them. It isn't required to retain this state though - they aren't | ||
| 9 | required by StartImage() or anything else in the boot hook, so clean them | ||
| 10 | up before grub_cmd_chainloader() finishes. | ||
| 11 | |||
| 12 | Signed-off-by: Chris Coulson <chris.coulson@canonical.com> | ||
| 13 | Reviewed-by: Daniel Kiper <daniel.kiper@oracle.com> | ||
| 14 | |||
| 15 | Upstream-Status: Backport | ||
| 16 | |||
| 17 | Reference to upstream patch: | ||
| 18 | https://git.savannah.gnu.org/cgit/grub.git/commit/?id=1469983ebb9674753ad333d37087fb8cb20e1dce | ||
| 19 | |||
| 20 | Signed-off-by: Xiangyu Chen <xiangyu.chen@windriver.com> | ||
| 21 | --- | ||
| 22 | grub-core/loader/efi/chainloader.c | 38 +++++++++++++++++------------- | ||
| 23 | 1 file changed, 21 insertions(+), 17 deletions(-) | ||
| 24 | |||
| 25 | diff --git a/grub-core/loader/efi/chainloader.c b/grub-core/loader/efi/chainloader.c | ||
| 26 | index 2bd80f4db..d1602c89b 100644 | ||
| 27 | --- a/grub-core/loader/efi/chainloader.c | ||
| 28 | +++ b/grub-core/loader/efi/chainloader.c | ||
| 29 | @@ -44,25 +44,20 @@ GRUB_MOD_LICENSE ("GPLv3+"); | ||
| 30 | |||
| 31 | static grub_dl_t my_mod; | ||
| 32 | |||
| 33 | -static grub_efi_physical_address_t address; | ||
| 34 | -static grub_efi_uintn_t pages; | ||
| 35 | -static grub_efi_device_path_t *file_path; | ||
| 36 | static grub_efi_handle_t image_handle; | ||
| 37 | -static grub_efi_char16_t *cmdline; | ||
| 38 | |||
| 39 | static grub_err_t | ||
| 40 | grub_chainloader_unload (void) | ||
| 41 | { | ||
| 42 | + grub_efi_loaded_image_t *loaded_image; | ||
| 43 | grub_efi_boot_services_t *b; | ||
| 44 | |||
| 45 | + loaded_image = grub_efi_get_loaded_image (image_handle); | ||
| 46 | + if (loaded_image != NULL) | ||
| 47 | + grub_free (loaded_image->load_options); | ||
| 48 | + | ||
| 49 | b = grub_efi_system_table->boot_services; | ||
| 50 | efi_call_1 (b->unload_image, image_handle); | ||
| 51 | - efi_call_2 (b->free_pages, address, pages); | ||
| 52 | - | ||
| 53 | - grub_free (file_path); | ||
| 54 | - grub_free (cmdline); | ||
| 55 | - cmdline = 0; | ||
| 56 | - file_path = 0; | ||
| 57 | |||
| 58 | grub_dl_unref (my_mod); | ||
| 59 | return GRUB_ERR_NONE; | ||
| 60 | @@ -140,7 +135,7 @@ make_file_path (grub_efi_device_path_t *dp, const char *filename) | ||
| 61 | char *dir_start; | ||
| 62 | char *dir_end; | ||
| 63 | grub_size_t size; | ||
| 64 | - grub_efi_device_path_t *d; | ||
| 65 | + grub_efi_device_path_t *d, *file_path; | ||
| 66 | |||
| 67 | dir_start = grub_strchr (filename, ')'); | ||
| 68 | if (! dir_start) | ||
| 69 | @@ -222,11 +217,14 @@ grub_cmd_chainloader (grub_command_t cmd __attribute__ ((unused)), | ||
| 70 | grub_efi_status_t status; | ||
| 71 | grub_efi_boot_services_t *b; | ||
| 72 | grub_device_t dev = 0; | ||
| 73 | - grub_efi_device_path_t *dp = 0; | ||
| 74 | + grub_efi_device_path_t *dp = NULL, *file_path = NULL; | ||
| 75 | grub_efi_loaded_image_t *loaded_image; | ||
| 76 | char *filename; | ||
| 77 | void *boot_image = 0; | ||
| 78 | grub_efi_handle_t dev_handle = 0; | ||
| 79 | + grub_efi_physical_address_t address = 0; | ||
| 80 | + grub_efi_uintn_t pages = 0; | ||
| 81 | + grub_efi_char16_t *cmdline = NULL; | ||
| 82 | |||
| 83 | if (argc == 0) | ||
| 84 | return grub_error (GRUB_ERR_BAD_ARGUMENT, N_("filename expected")); | ||
| 85 | @@ -234,11 +232,6 @@ grub_cmd_chainloader (grub_command_t cmd __attribute__ ((unused)), | ||
| 86 | |||
| 87 | grub_dl_ref (my_mod); | ||
| 88 | |||
| 89 | - /* Initialize some global variables. */ | ||
| 90 | - address = 0; | ||
| 91 | - image_handle = 0; | ||
| 92 | - file_path = 0; | ||
| 93 | - | ||
| 94 | b = grub_efi_system_table->boot_services; | ||
| 95 | |||
| 96 | file = grub_file_open (filename, GRUB_FILE_TYPE_EFI_CHAINLOADED_IMAGE); | ||
| 97 | @@ -408,6 +401,10 @@ grub_cmd_chainloader (grub_command_t cmd __attribute__ ((unused)), | ||
| 98 | grub_file_close (file); | ||
| 99 | grub_device_close (dev); | ||
| 100 | |||
| 101 | + /* We're finished with the source image buffer and file path now. */ | ||
| 102 | + efi_call_2 (b->free_pages, address, pages); | ||
| 103 | + grub_free (file_path); | ||
| 104 | + | ||
| 105 | grub_loader_set (grub_chainloader_boot, grub_chainloader_unload, 0); | ||
| 106 | return 0; | ||
| 107 | |||
| 108 | @@ -419,11 +416,18 @@ grub_cmd_chainloader (grub_command_t cmd __attribute__ ((unused)), | ||
| 109 | if (file) | ||
| 110 | grub_file_close (file); | ||
| 111 | |||
| 112 | + grub_free (cmdline); | ||
| 113 | grub_free (file_path); | ||
| 114 | |||
| 115 | if (address) | ||
| 116 | efi_call_2 (b->free_pages, address, pages); | ||
| 117 | |||
| 118 | + if (image_handle != NULL) | ||
| 119 | + { | ||
| 120 | + efi_call_1 (b->unload_image, image_handle); | ||
| 121 | + image_handle = NULL; | ||
| 122 | + } | ||
| 123 | + | ||
| 124 | grub_dl_unref (my_mod); | ||
| 125 | |||
| 126 | return grub_errno; | ||
| 127 | -- | ||
| 128 | 2.34.1 | ||
| 129 | |||
diff --git a/meta/recipes-bsp/grub/grub2.inc b/meta/recipes-bsp/grub/grub2.inc index 7161c4560b..e819cb9775 100644 --- a/meta/recipes-bsp/grub/grub2.inc +++ b/meta/recipes-bsp/grub/grub2.inc | |||
| @@ -34,6 +34,9 @@ SRC_URI = "${GNU_MIRROR}/grub/grub-${PV}.tar.gz \ | |||
| 34 | file://CVE-2022-28735-kern-efi-sb-Reject-non-kernel-files-in-the-shim_lock.patch \ | 34 | file://CVE-2022-28735-kern-efi-sb-Reject-non-kernel-files-in-the-shim_lock.patch \ |
| 35 | file://0001-configure-Remove-obsoleted-malign-jumps-loops-functi.patch \ | 35 | file://0001-configure-Remove-obsoleted-malign-jumps-loops-functi.patch \ |
| 36 | file://0002-configure-Check-for-falign-jumps-1-beside-falign-loo.patch \ | 36 | file://0002-configure-Check-for-falign-jumps-1-beside-falign-loo.patch \ |
| 37 | file://loader-efi-chainloader-Simplify-the-loader-state.patch \ | ||
| 38 | file://commands-boot-Add-API-to-pass-context-to-loader.patch \ | ||
| 39 | file://CVE-2022-28736-loader-efi-chainloader-Use-grub_loader_set_ex.patch\ | ||
| 37 | " | 40 | " |
| 38 | 41 | ||
| 39 | SRC_URI[sha256sum] = "23b64b4c741569f9426ed2e3d0e6780796fca081bee4c99f62aa3f53ae803f5f" | 42 | SRC_URI[sha256sum] = "23b64b4c741569f9426ed2e3d0e6780796fca081bee4c99f62aa3f53ae803f5f" |
