mirror of
git://git.yoctoproject.org/poky.git
synced 2025-07-19 21:09:03 +02:00
grub: patch CVE-2025-0622
Cherry-pick patch mentioning this CVE. (From OE-Core rev: aeefadfda0e98d0b3369c4abc98485774e1fe562) Signed-off-by: Peter Marko <peter.marko@siemens.com> Signed-off-by: Steve Sakoman <steve@sakoman.com>
This commit is contained in:
parent
1867cc36c7
commit
845904fa23
35
meta/recipes-bsp/grub/files/CVE-2025-0622-01.patch
Normal file
35
meta/recipes-bsp/grub/files/CVE-2025-0622-01.patch
Normal file
|
@ -0,0 +1,35 @@
|
||||||
|
From 2123c5bca7e21fbeb0263df4597ddd7054700726 Mon Sep 17 00:00:00 2001
|
||||||
|
From: B Horn <b@horn.uk>
|
||||||
|
Date: Fri, 1 Nov 2024 19:24:29 +0000
|
||||||
|
Subject: [PATCH 1/3] commands/pgp: Unregister the "check_signatures" hooks on
|
||||||
|
module unload
|
||||||
|
|
||||||
|
If the hooks are not removed they can be called after the module has
|
||||||
|
been unloaded leading to an use-after-free.
|
||||||
|
|
||||||
|
Fixes: CVE-2025-0622
|
||||||
|
|
||||||
|
Reported-by: B Horn <b@horn.uk>
|
||||||
|
Signed-off-by: B Horn <b@horn.uk>
|
||||||
|
Reviewed-by: Daniel Kiper <daniel.kiper@oracle.com>
|
||||||
|
|
||||||
|
CVE: CVE-2025-0622
|
||||||
|
Upstream-Status: Backport [https://git.savannah.gnu.org/cgit/grub.git/commit/?id=2123c5bca7e21fbeb0263df4597ddd7054700726]
|
||||||
|
Signed-off-by: Peter Marko <peter.marko@siemens.com>
|
||||||
|
---
|
||||||
|
grub-core/commands/pgp.c | 2 ++
|
||||||
|
1 file changed, 2 insertions(+)
|
||||||
|
|
||||||
|
diff --git a/grub-core/commands/pgp.c b/grub-core/commands/pgp.c
|
||||||
|
index c6766f044..5fadc33c4 100644
|
||||||
|
--- a/grub-core/commands/pgp.c
|
||||||
|
+++ b/grub-core/commands/pgp.c
|
||||||
|
@@ -1010,6 +1010,8 @@ GRUB_MOD_INIT(pgp)
|
||||||
|
|
||||||
|
GRUB_MOD_FINI(pgp)
|
||||||
|
{
|
||||||
|
+ grub_register_variable_hook ("check_signatures", NULL, NULL);
|
||||||
|
+ grub_env_unset ("check_signatures");
|
||||||
|
grub_verifier_unregister (&grub_pubkey_verifier);
|
||||||
|
grub_unregister_extcmd (cmd);
|
||||||
|
grub_unregister_extcmd (cmd_trust);
|
41
meta/recipes-bsp/grub/files/CVE-2025-0622-02.patch
Normal file
41
meta/recipes-bsp/grub/files/CVE-2025-0622-02.patch
Normal file
|
@ -0,0 +1,41 @@
|
||||||
|
From 9c16197734ada8d0838407eebe081117799bfe67 Mon Sep 17 00:00:00 2001
|
||||||
|
From: B Horn <b@horn.uk>
|
||||||
|
Date: Fri, 1 Nov 2024 23:46:55 +0000
|
||||||
|
Subject: [PATCH 2/3] normal: Remove variables hooks on module unload
|
||||||
|
|
||||||
|
The normal module does not entirely cleanup after itself in
|
||||||
|
its GRUB_MOD_FINI() leaving a few variables hooks in place.
|
||||||
|
It is not possible to unload normal module now but fix the
|
||||||
|
issues for completeness.
|
||||||
|
|
||||||
|
On the occasion replace 0s with NULLs for "pager" variable
|
||||||
|
hooks unregister.
|
||||||
|
|
||||||
|
Fixes: CVE-2025-0622
|
||||||
|
|
||||||
|
Reported-by: B Horn <b@horn.uk>
|
||||||
|
Signed-off-by: B Horn <b@horn.uk>
|
||||||
|
Reviewed-by: Daniel Kiper <daniel.kiper@oracle.com>
|
||||||
|
|
||||||
|
CVE: CVE-2025-0622
|
||||||
|
Upstream-Status: Backport [https://git.savannah.gnu.org/cgit/grub.git/commit/?id=9c16197734ada8d0838407eebe081117799bfe67]
|
||||||
|
Signed-off-by: Peter Marko <peter.marko@siemens.com>
|
||||||
|
---
|
||||||
|
grub-core/normal/main.c | 4 +++-
|
||||||
|
1 file changed, 3 insertions(+), 1 deletion(-)
|
||||||
|
|
||||||
|
diff --git a/grub-core/normal/main.c b/grub-core/normal/main.c
|
||||||
|
index 838f57fa5..04d058f55 100644
|
||||||
|
--- a/grub-core/normal/main.c
|
||||||
|
+++ b/grub-core/normal/main.c
|
||||||
|
@@ -582,7 +582,9 @@ GRUB_MOD_FINI(normal)
|
||||||
|
grub_xputs = grub_xputs_saved;
|
||||||
|
|
||||||
|
grub_set_history (0);
|
||||||
|
- grub_register_variable_hook ("pager", 0, 0);
|
||||||
|
+ grub_register_variable_hook ("pager", NULL, NULL);
|
||||||
|
+ grub_register_variable_hook ("color_normal", NULL, NULL);
|
||||||
|
+ grub_register_variable_hook ("color_highlight", NULL, NULL);
|
||||||
|
grub_fs_autoload_hook = 0;
|
||||||
|
grub_unregister_command (cmd_clear);
|
||||||
|
}
|
38
meta/recipes-bsp/grub/files/CVE-2025-0622-03.patch
Normal file
38
meta/recipes-bsp/grub/files/CVE-2025-0622-03.patch
Normal file
|
@ -0,0 +1,38 @@
|
||||||
|
From 7580addfc8c94cedb0cdfd7a1fd65b539215e637 Mon Sep 17 00:00:00 2001
|
||||||
|
From: B Horn <b@horn.uk>
|
||||||
|
Date: Fri, 1 Nov 2024 23:52:06 +0000
|
||||||
|
Subject: [PATCH 3/3] gettext: Remove variables hooks on module unload
|
||||||
|
|
||||||
|
The gettext module does not entirely cleanup after itself in
|
||||||
|
its GRUB_MOD_FINI() leaving a few variables hooks in place.
|
||||||
|
It is not possible to unload gettext module because normal
|
||||||
|
module depends on it. Though fix the issues for completeness.
|
||||||
|
|
||||||
|
Fixes: CVE-2025-0622
|
||||||
|
|
||||||
|
Reported-by: B Horn <b@horn.uk>
|
||||||
|
Signed-off-by: B Horn <b@horn.uk>
|
||||||
|
Reviewed-by: Daniel Kiper <daniel.kiper@oracle.com>
|
||||||
|
|
||||||
|
CVE: CVE-2025-0622
|
||||||
|
Upstream-Status: Backport [https://git.savannah.gnu.org/cgit/grub.git/commit/?id=7580addfc8c94cedb0cdfd7a1fd65b539215e637]
|
||||||
|
Signed-off-by: Peter Marko <peter.marko@siemens.com>
|
||||||
|
---
|
||||||
|
grub-core/gettext/gettext.c | 4 ++++
|
||||||
|
1 file changed, 4 insertions(+)
|
||||||
|
|
||||||
|
diff --git a/grub-core/gettext/gettext.c b/grub-core/gettext/gettext.c
|
||||||
|
index 7a1c14e4f..e4f4f8ee6 100644
|
||||||
|
--- a/grub-core/gettext/gettext.c
|
||||||
|
+++ b/grub-core/gettext/gettext.c
|
||||||
|
@@ -535,6 +535,10 @@ GRUB_MOD_INIT (gettext)
|
||||||
|
|
||||||
|
GRUB_MOD_FINI (gettext)
|
||||||
|
{
|
||||||
|
+ grub_register_variable_hook ("locale_dir", NULL, NULL);
|
||||||
|
+ grub_register_variable_hook ("secondary_locale_dir", NULL, NULL);
|
||||||
|
+ grub_register_variable_hook ("lang", NULL, NULL);
|
||||||
|
+
|
||||||
|
grub_gettext_delete_list (&main_context);
|
||||||
|
grub_gettext_delete_list (&secondary_context);
|
||||||
|
|
|
@ -26,6 +26,9 @@ SRC_URI = "${GNU_MIRROR}/grub/grub-${PV}.tar.gz \
|
||||||
file://CVE-2025-0624.patch \
|
file://CVE-2025-0624.patch \
|
||||||
file://CVE-2024-45774.patch \
|
file://CVE-2024-45774.patch \
|
||||||
file://CVE-2024-45775.patch \
|
file://CVE-2024-45775.patch \
|
||||||
|
file://CVE-2025-0622-01.patch \
|
||||||
|
file://CVE-2025-0622-02.patch \
|
||||||
|
file://CVE-2025-0622-03.patch \
|
||||||
"
|
"
|
||||||
|
|
||||||
SRC_URI[sha256sum] = "b30919fa5be280417c17ac561bb1650f60cfb80cc6237fa1e2b6f56154cb9c91"
|
SRC_URI[sha256sum] = "b30919fa5be280417c17ac561bb1650f60cfb80cc6237fa1e2b6f56154cb9c91"
|
||||||
|
|
Loading…
Reference in New Issue
Block a user