daea2d8219
Porting patches from grub2_2.06-3~deb11u6 to fix CVE-2023-4692/CVE-2023-4693. The source code of grub2_2.06-3~deb11u6 is from: https://snapshot.debian.org/archive/debian-security/20231006T185629Z/ pool/updates/main/g/grub2/grub2_2.06-3~deb11u6.debian.tar.xz Patch for CVE-2023-4692: <fs/ntfs: Fix an OOB write when parsing the $ATTRIBUTE_LIST attribute for the $MFT file> Patch for CVE-2023-4693: <fs/ntfs: Fix an OOB read when reading data from the resident $DATA attribute> No content changes for all the patches from debian release. We do this because grub2/grub-efi is ported from wrlinux for secure boot bringing up. Test plan: - PASS: build grub2/grub-efi. - PASS: build-image and install and boot up on lab/qemu. - PASS: check that the "stx.N" version number is right for both bios(grub2 ver) and uefi(grub-efi ver) boot. Closes-bug: 2038742 Signed-off-by: Li Zhou <li.zhou@windriver.com> Change-Id: I7c8e11952fb409be93e9d777bf7da7b87414a95d
46 lines
2.7 KiB
Plaintext
46 lines
2.7 KiB
Plaintext
0001-grub2-add-tboot.patch
|
|
0002-grub2-checking-if-loop-devices-are-available.patch
|
|
0020-kern-efi-sb-Reject-non-kernel-files-in-the-shim_lock.patch
|
|
0021-video-readers-Add-artificial-limit-to-image-dimensio.patch
|
|
0022-font-Reject-glyphs-exceeds-font-max_glyph_width-or-f.patch
|
|
0023-font-Fix-size-overflow-in-grub_font_get_glyph_intern.patch
|
|
0024-font-Fix-several-integer-overflows-in-grub_font_cons.patch
|
|
0025-font-Remove-grub_font_dup_glyph.patch
|
|
0026-font-Fix-integer-overflow-in-ensure_comb_space.patch
|
|
0027-font-Fix-integer-overflow-in-BMP-index.patch
|
|
0028-font-Fix-integer-underflow-in-binary-search-of-char-.patch
|
|
0029-kern-efi-sb-Enforce-verification-of-font-files.patch
|
|
0030-fbutil-Fix-integer-overflow.patch
|
|
0031-font-Fix-an-integer-underflow-in-blit_comb.patch
|
|
0032-font-Harden-grub_font_blit_glyph-and-grub_font_blit_.patch
|
|
0033-font-Assign-null_font-to-glyphs-in-ascii_font_glyph.patch
|
|
0034-normal-charset-Fix-an-integer-overflow-in-grub_unico.patch
|
|
0035-video-readers-png-Drop-greyscale-support-to-fix-heap.patch
|
|
0036-video-readers-png-Avoid-heap-OOB-R-W-inserting-huff-.patch
|
|
0037-video-readers-jpeg-Block-int-underflow-wild-pointer-.patch
|
|
0038-net-ip-Do-IP-fragment-maths-safely.patch
|
|
0039-net-http-Fix-OOB-write-for-split-http-headers.patch
|
|
0040-net-http-Error-out-on-headers-with-LF-without-CR.patch
|
|
0041-loader-efi-chainloader-Simplify-the-loader-state.patch
|
|
0042-commands-boot-Add-API-to-pass-context-to-loader.patch
|
|
0043-loader-efi-chainloader-Use-grub_loader_set_ex.patch
|
|
0044-fs-ntfs-Fix-an-OOB-write-when-parsing-the-ATTRIBUTE_.patch
|
|
0045-fs-ntfs-Fix-an-OOB-read-when-reading-data-from-the-r.patch
|
|
lat/0003-Make-UEFI-watchdog-behaviour-configurable.patch
|
|
lat/0004-correct-grub_errno.patch
|
|
lat/0005-grub-verify-Add-skip_check_cfg-variable.patch
|
|
secure-core/0006-pe32.h-add-header-structures-for-TE-and-DOS-executab.patch
|
|
secure-core/0007-shim-add-needed-data-structures.patch
|
|
secure-core/0008-efi-chainloader-implement-an-UEFI-Exit-service.patch
|
|
secure-core/0009-efi-chainloader-port-shim-to-grub.patch
|
|
secure-core/0010-efi-chainloader-use-shim-to-load-and-verify-an-image.patch
|
|
secure-core/0011-efi-chainloader-boot-the-image-using-shim.patch
|
|
secure-core/0012-efi-chainloader-take-care-of-unload-undershim.patch
|
|
secure-core/0013-chainloader-handle-the-unauthenticated-image-by-shim.patch
|
|
secure-core/0014-chainloader-Don-t-check-empty-section-in-file-like-..patch
|
|
secure-core/0015-chainloader-find-the-relocations-correctly.patch
|
|
secure-core/0016-Add-a-module-for-reading-EFI-global-variables.patch
|
|
secure-core/0017-grub-shim-verify-Report-that-the-loaded-object-is-ve.patch
|
|
secure-core/0018-grub-verify-Add-strict_security-variable.patch
|
|
secure-core/0019-Disable-inside-lockdown-and-shim_lock-verifiers.patch
|