diff options
| -rw-r--r-- | meta/recipes-bsp/grub/files/CVE-2025-1118.patch | 37 | ||||
| -rw-r--r-- | meta/recipes-bsp/grub/grub2.inc | 1 |
2 files changed, 38 insertions, 0 deletions
diff --git a/meta/recipes-bsp/grub/files/CVE-2025-1118.patch b/meta/recipes-bsp/grub/files/CVE-2025-1118.patch new file mode 100644 index 0000000000..e6906d909c --- /dev/null +++ b/meta/recipes-bsp/grub/files/CVE-2025-1118.patch | |||
| @@ -0,0 +1,37 @@ | |||
| 1 | From 34824806ac6302f91e8cabaa41308eaced25725f Mon Sep 17 00:00:00 2001 | ||
| 2 | From: B Horn <b@horn.uk> | ||
| 3 | Date: Thu, 18 Apr 2024 20:29:39 +0100 | ||
| 4 | Subject: [PATCH] commands/minicmd: Block the dump command in lockdown mode | ||
| 5 | |||
| 6 | The dump enables a user to read memory which should not be possible | ||
| 7 | in lockdown mode. | ||
| 8 | |||
| 9 | Fixes: CVE-2025-1118 | ||
| 10 | |||
| 11 | Reported-by: B Horn <b@horn.uk> | ||
| 12 | Reported-by: Jonathan Bar Or <jonathanbaror@gmail.com> | ||
| 13 | Signed-off-by: B Horn <b@horn.uk> | ||
| 14 | Reviewed-by: Daniel Kiper <daniel.kiper@oracle.com> | ||
| 15 | |||
| 16 | CVE: CVE-2025-1118 | ||
| 17 | Upstream-Status: Backport [https://git.savannah.gnu.org/cgit/grub.git/commit/?id=34824806ac6302f91e8cabaa41308eaced25725f] | ||
| 18 | Signed-off-by: Peter Marko <peter.marko@siemens.com> | ||
| 19 | --- | ||
| 20 | grub-core/commands/minicmd.c | 4 ++-- | ||
| 21 | 1 file changed, 2 insertions(+), 2 deletions(-) | ||
| 22 | |||
| 23 | diff --git a/grub-core/commands/minicmd.c b/grub-core/commands/minicmd.c | ||
| 24 | index 286290866..8c5ee3e60 100644 | ||
| 25 | --- a/grub-core/commands/minicmd.c | ||
| 26 | +++ b/grub-core/commands/minicmd.c | ||
| 27 | @@ -203,8 +203,8 @@ GRUB_MOD_INIT(minicmd) | ||
| 28 | grub_register_command ("help", grub_mini_cmd_help, | ||
| 29 | 0, N_("Show this message.")); | ||
| 30 | cmd_dump = | ||
| 31 | - grub_register_command ("dump", grub_mini_cmd_dump, | ||
| 32 | - N_("ADDR [SIZE]"), N_("Show memory contents.")); | ||
| 33 | + grub_register_command_lockdown ("dump", grub_mini_cmd_dump, | ||
| 34 | + N_("ADDR [SIZE]"), N_("Show memory contents.")); | ||
| 35 | cmd_rmmod = | ||
| 36 | grub_register_command ("rmmod", grub_mini_cmd_rmmod, | ||
| 37 | N_("MODULE"), N_("Remove a module.")); | ||
diff --git a/meta/recipes-bsp/grub/grub2.inc b/meta/recipes-bsp/grub/grub2.inc index af6f434c5f..dbceaf9931 100644 --- a/meta/recipes-bsp/grub/grub2.inc +++ b/meta/recipes-bsp/grub/grub2.inc | |||
| @@ -33,6 +33,7 @@ SRC_URI = "${GNU_MIRROR}/grub/grub-${PV}.tar.gz \ | |||
| 33 | file://CVE-2024-45776.patch \ | 33 | file://CVE-2024-45776.patch \ |
| 34 | file://CVE-2024-45777.patch \ | 34 | file://CVE-2024-45777.patch \ |
| 35 | file://CVE-2025-0690.patch \ | 35 | file://CVE-2025-0690.patch \ |
| 36 | file://CVE-2025-1118.patch \ | ||
| 36 | " | 37 | " |
| 37 | 38 | ||
| 38 | SRC_URI[sha256sum] = "b30919fa5be280417c17ac561bb1650f60cfb80cc6237fa1e2b6f56154cb9c91" | 39 | SRC_URI[sha256sum] = "b30919fa5be280417c17ac561bb1650f60cfb80cc6237fa1e2b6f56154cb9c91" |
