This patch brings the entire stack of Debian patches on grub2 titled
"cve-2025-jan" and available at:
https://salsa.debian.org/grub-team/grub/-/tree/debian/2.12-9/debian/patches/cve-2025-jan?ref_type=tags
As of this exact Debian grub2 version 2.12-9. Some minor conflicts had
to be fixed. All patches are in upstream Grub master, but mixed with
hundreds of other changes, which is why Debian's effort to backport
them has been leveraged here.
In addition to those patches, 2 extra patches are added:
0073-net-drivers-ieee1275-ofnet-Add-missing-grub_malloc.patch
0074-Constant-time-grub_crypto_memcmp.patch
The first one fixes an issue in one of the earlier patches. The fix is
not in Debian, but is in upstream Grub.
The second one fixes another CVE, not fixed in Debian, but fixed in
OpenSUSE. This fix is not upstream as upstream has decided to move to
libgcrypt instead to avoid the problem, but that's a fairly large
change.
Overall, this patch fixes all CVEs currently reported by pkg-stats
against our grub2 package, namely:
CVE-2024-45777
CVE-2024-45778
CVE-2024-45779
CVE-2024-45780
CVE-2024-45782
CVE-2024-56737
CVE-2024-56738
CVE-2025-0678
CVE-2025-0684
CVE-2025-0685
CVE-2025-0686
CVE-2025-0689
CVE-2025-1125
With the previous fixes on runtime tests added (to use glibc
toolchains to build grub2 tests), this commit successfully passes all
tests:
- The ISO9660 tests that use grub2:
https://gitlab.com/tpetazzoni/buildroot/-/pipelines/1985234563
- The grub2 tests:
https://gitlab.com/tpetazzoni/buildroot/-/pipelines/1985234685
Signed-off-by: Thomas Petazzoni <thomas.petazzoni@bootlin.com>
[Julien: also tested by building and booting
- qemu_aarch64_sbsa_defconfig
- qemu_arm_ebbr_defconfig
- qemu_loongarch64_virt_efi_defconfig
- qemu_riscv64_virt_efi_defconfig
- pc_x86_64_bios_defconfig
- pc_x86_64_efi_defconfig
]
Tested-by: Julien Olivain <ju.o@free.fr>
[Julien:
- fix patch #72 upstream link to point to the initial patch
sumbission rather than a reply
- merge two _IGNORE_CVES blocks for patch #50 into a single one
- order _IGNORE_CVES blocks by numerical patch order
- order numerically the CVE list in commit log
- add a "Fixes:" tag in patch #74 since its commit log does not
mention the CVE.
]
Signed-off-by: Julien Olivain <ju.o@free.fr>
(cherry picked from commit ded3e0045a)
Signed-off-by: Thomas Perale <thomas.perale@mind.be>
229 lines
8.1 KiB
Makefile
229 lines
8.1 KiB
Makefile
################################################################################
|
|
#
|
|
# grub2
|
|
#
|
|
################################################################################
|
|
|
|
GRUB2_VERSION = 2.12
|
|
GRUB2_SITE = $(BR2_GNU_MIRROR)/grub
|
|
GRUB2_SOURCE = grub-$(GRUB2_VERSION).tar.xz
|
|
GRUB2_LICENSE = GPL-3.0+
|
|
GRUB2_LICENSE_FILES = COPYING
|
|
GRUB2_DEPENDENCIES = host-bison host-flex host-gawk host-grub2 \
|
|
$(BR2_PYTHON3_HOST_DEPENDENCY)
|
|
HOST_GRUB2_DEPENDENCIES = host-bison host-flex host-gawk \
|
|
$(BR2_PYTHON3_HOST_DEPENDENCY)
|
|
GRUB2_INSTALL_IMAGES = YES
|
|
|
|
# CVE-2019-14865 is about a flaw in the grub2-set-bootflag tool, which
|
|
# doesn't exist upstream, but is added by the Redhat/Fedora
|
|
# packaging. Not applicable to Buildroot.
|
|
GRUB2_IGNORE_CVES += CVE-2019-14865
|
|
# vulnerability is specific to the Redhat distribution, affects a
|
|
# downstream change from Redhat related to password authentication
|
|
GRUB2_IGNORE_CVES += CVE-2023-4001
|
|
# vulnerability is specific to the Redhat distribution, affects the
|
|
# grub2-set-bootflag tool, which doesn't exist upstream
|
|
GRUB2_IGNORE_CVES += CVE-2024-1048
|
|
|
|
# 0004-fs-hfs-Fix-stack-OOB-write-with-grub_strcpy.patch (yes, two
|
|
# CVEs are fixed by this patch)
|
|
GRUB2_IGNORE_CVES += CVE-2024-45782
|
|
GRUB2_IGNORE_CVES += CVE-2024-56737
|
|
|
|
# 0006-fs-tar-Integer-overflow-leads-to-heap-OOB-write.patch
|
|
GRUB2_IGNORE_CVES += CVE-2024-45780
|
|
|
|
# 0037-gettext-Integer-overflow-leads-to-heap-OOB-write.patch
|
|
GRUB2_IGNORE_CVES += CVE-2024-45777
|
|
|
|
# 0043-fs-bfs-Disable-under-lockdown.patch (yes, two CVEs are fixed by
|
|
# this patch)
|
|
GRUB2_IGNORE_CVES += CVE-2024-45778
|
|
GRUB2_IGNORE_CVES += CVE-2024-45779
|
|
|
|
# 0044-fs-Disable-many-filesystems-under-lockdown.patch (yes, four
|
|
# CVEs are fixed by this patch)
|
|
GRUB2_IGNORE_CVES += CVE-2025-0684
|
|
GRUB2_IGNORE_CVES += CVE-2025-0685
|
|
GRUB2_IGNORE_CVES += CVE-2025-0686
|
|
GRUB2_IGNORE_CVES += CVE-2025-0689
|
|
|
|
# 0050-fs-Prevent-overflows-when-allocating-memory-for-arra.patch
|
|
# (yes, two CVEs are fixed by this patch)
|
|
GRUB2_IGNORE_CVES += CVE-2025-0678
|
|
GRUB2_IGNORE_CVES += CVE-2025-1125
|
|
|
|
# 0074-Constant-time-grub_crypto_memcmp.patch
|
|
GRUB2_IGNORE_CVES += CVE-2024-56738
|
|
|
|
ifeq ($(BR2_TARGET_GRUB2_INSTALL_TOOLS),y)
|
|
GRUB2_INSTALL_TARGET = YES
|
|
else
|
|
GRUB2_INSTALL_TARGET = NO
|
|
endif
|
|
GRUB2_CPE_ID_VENDOR = gnu
|
|
|
|
GRUB2_BUILTIN_MODULES_PC = $(call qstrip,$(BR2_TARGET_GRUB2_BUILTIN_MODULES_PC))
|
|
GRUB2_BUILTIN_MODULES_EFI = $(call qstrip,$(BR2_TARGET_GRUB2_BUILTIN_MODULES_EFI))
|
|
GRUB2_BUILTIN_CONFIG_PC = $(call qstrip,$(BR2_TARGET_GRUB2_BUILTIN_CONFIG_PC))
|
|
GRUB2_BUILTIN_CONFIG_EFI = $(call qstrip,$(BR2_TARGET_GRUB2_BUILTIN_CONFIG_EFI))
|
|
GRUB2_BOOT_PARTITION = $(call qstrip,$(BR2_TARGET_GRUB2_BOOT_PARTITION))
|
|
|
|
GRUB2_IMAGE_i386-pc = $(BINARIES_DIR)/grub.img
|
|
GRUB2_CFG_i386-pc = $(TARGET_DIR)/boot/grub/grub.cfg
|
|
GRUB2_PREFIX_i386-pc = ($(GRUB2_BOOT_PARTITION))/boot/grub
|
|
GRUB2_TARGET_i386-pc = i386
|
|
GRUB2_PLATFORM_i386-pc = pc
|
|
GRUB2_BUILTIN_CONFIG_i386-pc = $(GRUB2_BUILTIN_CONFIG_PC)
|
|
GRUB2_BUILTIN_MODULES_i386-pc = $(GRUB2_BUILTIN_MODULES_PC)
|
|
GRUB2_TUPLES-$(BR2_TARGET_GRUB2_I386_PC) += i386-pc
|
|
|
|
GRUB2_IMAGE_i386-efi = $(BINARIES_DIR)/efi-part/EFI/BOOT/bootia32.efi
|
|
GRUB2_CFG_i386-efi = $(BINARIES_DIR)/efi-part/EFI/BOOT/grub.cfg
|
|
GRUB2_PREFIX_i386-efi = /EFI/BOOT
|
|
GRUB2_TARGET_i386-efi = i386
|
|
GRUB2_PLATFORM_i386-efi = efi
|
|
GRUB2_BUILTIN_CONFIG_i386-efi = $(GRUB2_BUILTIN_CONFIG_EFI)
|
|
GRUB2_BUILTIN_MODULES_i386-efi = $(GRUB2_BUILTIN_MODULES_EFI)
|
|
GRUB2_TUPLES-$(BR2_TARGET_GRUB2_I386_EFI) += i386-efi
|
|
|
|
GRUB2_IMAGE_x86_64-efi = $(BINARIES_DIR)/efi-part/EFI/BOOT/bootx64.efi
|
|
GRUB2_CFG_x86_64-efi = $(BINARIES_DIR)/efi-part/EFI/BOOT/grub.cfg
|
|
GRUB2_PREFIX_x86_64-efi = /EFI/BOOT
|
|
GRUB2_TARGET_x86_64-efi = x86_64
|
|
GRUB2_PLATFORM_x86_64-efi = efi
|
|
GRUB2_BUILTIN_CONFIG_x86_64-efi = $(GRUB2_BUILTIN_CONFIG_EFI)
|
|
GRUB2_BUILTIN_MODULES_x86_64-efi = $(GRUB2_BUILTIN_MODULES_EFI)
|
|
GRUB2_TUPLES-$(BR2_TARGET_GRUB2_X86_64_EFI) += x86_64-efi
|
|
|
|
GRUB2_IMAGE_arm-uboot = $(BINARIES_DIR)/boot-part/grub/grub.img
|
|
GRUB2_CFG_arm-uboot = $(BINARIES_DIR)/boot-part/grub/grub.cfg
|
|
GRUB2_PREFIX_arm-uboot = ($(GRUB2_BOOT_PARTITION))/boot/grub
|
|
GRUB2_TARGET_arm-uboot = arm
|
|
GRUB2_PLATFORM_arm-uboot = uboot
|
|
GRUB2_BUILTIN_CONFIG_arm-uboot = $(GRUB2_BUILTIN_CONFIG_PC)
|
|
GRUB2_BUILTIN_MODULES_arm-uboot = $(GRUB2_BUILTIN_MODULES_PC)
|
|
GRUB2_TUPLES-$(BR2_TARGET_GRUB2_ARM_UBOOT) += arm-uboot
|
|
|
|
GRUB2_IMAGE_arm-efi = $(BINARIES_DIR)/efi-part/EFI/BOOT/bootarm.efi
|
|
GRUB2_CFG_arm-efi = $(BINARIES_DIR)/efi-part/EFI/BOOT/grub.cfg
|
|
GRUB2_PREFIX_arm-efi = /EFI/BOOT
|
|
GRUB2_TARGET_arm-efi = arm
|
|
GRUB2_PLATFORM_arm-efi = efi
|
|
GRUB2_BUILTIN_CONFIG_arm-efi = $(GRUB2_BUILTIN_CONFIG_EFI)
|
|
GRUB2_BUILTIN_MODULES_arm-efi = $(GRUB2_BUILTIN_MODULES_EFI)
|
|
GRUB2_TUPLES-$(BR2_TARGET_GRUB2_ARM_EFI) += arm-efi
|
|
|
|
GRUB2_IMAGE_arm64-efi = $(BINARIES_DIR)/efi-part/EFI/BOOT/bootaa64.efi
|
|
GRUB2_CFG_arm64-efi = $(BINARIES_DIR)/efi-part/EFI/BOOT/grub.cfg
|
|
GRUB2_PREFIX_arm64-efi = /EFI/BOOT
|
|
GRUB2_TARGET_arm64-efi = aarch64
|
|
GRUB2_PLATFORM_arm64-efi = efi
|
|
GRUB2_BUILTIN_CONFIG_arm64-efi = $(GRUB2_BUILTIN_CONFIG_EFI)
|
|
GRUB2_BUILTIN_MODULES_arm64-efi = $(GRUB2_BUILTIN_MODULES_EFI)
|
|
GRUB2_TUPLES-$(BR2_TARGET_GRUB2_ARM64_EFI) += arm64-efi
|
|
|
|
GRUB2_IMAGE_riscv64-efi = $(BINARIES_DIR)/efi-part/EFI/BOOT/bootriscv64.efi
|
|
GRUB2_CFG_riscv64-efi = $(BINARIES_DIR)/efi-part/EFI/BOOT/grub.cfg
|
|
GRUB2_PREFIX_riscv64-efi = /EFI/BOOT
|
|
GRUB2_TARGET_riscv64-efi = riscv64
|
|
GRUB2_PLATFORM_riscv64-efi = efi
|
|
GRUB2_BUILTIN_CONFIG_riscv64-efi = $(GRUB2_BUILTIN_CONFIG_EFI)
|
|
GRUB2_BUILTIN_MODULES_riscv64-efi = $(GRUB2_BUILTIN_MODULES_EFI)
|
|
GRUB2_TUPLES-$(BR2_TARGET_GRUB2_RISCV64_EFI) += riscv64-efi
|
|
|
|
# Grub2 is kind of special: it considers CC, LD and so on to be the
|
|
# tools to build the host programs and uses TARGET_CC, TARGET_CFLAGS,
|
|
# TARGET_CPPFLAGS, TARGET_LDFLAGS to build the bootloader itself.
|
|
#
|
|
# NOTE: TARGET_STRIP is overridden by !BR2_STRIP_strip, so always
|
|
# use the cross compile variant to ensure grub2 builds
|
|
|
|
HOST_GRUB2_CONF_ENV = \
|
|
CPP="$(HOSTCC) -E"
|
|
|
|
GRUB2_CONF_ENV = \
|
|
CPP="$(TARGET_CC) -E" \
|
|
TARGET_CC="$(TARGET_CC)" \
|
|
CFLAGS="$(TARGET_CFLAGS) -Os" \
|
|
TARGET_CFLAGS="$(TARGET_CFLAGS) -Os" \
|
|
CPPFLAGS="$(TARGET_CPPFLAGS) -Os -fno-stack-protector" \
|
|
TARGET_CPPFLAGS="$(TARGET_CPPFLAGS) -Os -fno-stack-protector" \
|
|
TARGET_LDFLAGS="$(TARGET_LDFLAGS) -Os" \
|
|
TARGET_NM="$(TARGET_NM)" \
|
|
TARGET_OBJCOPY="$(TARGET_OBJCOPY)" \
|
|
TARGET_STRIP="$(TARGET_CROSS)strip"
|
|
|
|
HOST_GRUB2_CONF_OPTS = \
|
|
--with-platform=none \
|
|
--disable-grub-mkfont \
|
|
--enable-efiemu=no \
|
|
ac_cv_lib_lzma_lzma_code=no \
|
|
--enable-device-mapper=no \
|
|
--enable-libzfs=no \
|
|
--disable-werror
|
|
|
|
define GRUB2_CONFIGURE_CMDS
|
|
$(foreach tuple, $(GRUB2_TUPLES-y), \
|
|
@$(call MESSAGE,Configuring $(tuple))
|
|
mkdir -p $(@D)/build-$(tuple)
|
|
cd $(@D)/build-$(tuple) && \
|
|
$(TARGET_CONFIGURE_OPTS) \
|
|
$(TARGET_CONFIGURE_ARGS) \
|
|
$(GRUB2_CONF_ENV) \
|
|
../configure \
|
|
--target=$(GRUB2_TARGET_$(tuple)) \
|
|
--with-platform=$(GRUB2_PLATFORM_$(tuple)) \
|
|
--host=$(GNU_TARGET_NAME) \
|
|
--build=$(GNU_HOST_NAME) \
|
|
--prefix=/ \
|
|
--exec-prefix=/ \
|
|
--disable-grub-mkfont \
|
|
--enable-efiemu=no \
|
|
ac_cv_lib_lzma_lzma_code=no \
|
|
--enable-device-mapper=no \
|
|
--enable-libzfs=no \
|
|
--disable-werror
|
|
)
|
|
endef
|
|
|
|
define GRUB2_BUILD_CMDS
|
|
$(foreach tuple, $(GRUB2_TUPLES-y), \
|
|
@$(call MESSAGE,Building $(tuple))
|
|
$(TARGET_MAKE_ENV) $(MAKE) -C $(@D)/build-$(tuple)
|
|
)
|
|
endef
|
|
|
|
define GRUB2_INSTALL_IMAGES_CMDS
|
|
$(foreach tuple, $(GRUB2_TUPLES-y), \
|
|
@$(call MESSAGE,Installing $(tuple) to images directory)
|
|
mkdir -p $(dir $(GRUB2_IMAGE_$(tuple)))
|
|
$(HOST_DIR)/bin/grub-mkimage \
|
|
-d $(@D)/build-$(tuple)/grub-core/ \
|
|
-O $(tuple) \
|
|
-o $(GRUB2_IMAGE_$(tuple)) \
|
|
-p "$(GRUB2_PREFIX_$(tuple))" \
|
|
$(if $(GRUB2_BUILTIN_CONFIG_$(tuple)), \
|
|
-c $(GRUB2_BUILTIN_CONFIG_$(tuple))) \
|
|
$(GRUB2_BUILTIN_MODULES_$(tuple))
|
|
$(INSTALL) -D -m 0644 boot/grub2/grub.cfg $(GRUB2_CFG_$(tuple))
|
|
$(if $(findstring $(GRUB2_PLATFORM_$(tuple)), pc), \
|
|
cat $(@D)/build-$(tuple)/grub-core/cdboot.img $(GRUB2_IMAGE_$(tuple)) > \
|
|
$(BINARIES_DIR)/grub-eltorito.img
|
|
) \
|
|
)
|
|
endef
|
|
|
|
ifeq ($(BR2_TARGET_GRUB2_INSTALL_TOOLS),y)
|
|
define GRUB2_INSTALL_TARGET_CMDS
|
|
$(foreach tuple, $(GRUB2_TUPLES-y), \
|
|
@$(call MESSAGE,Installing $(tuple) to target directory)
|
|
$(TARGET_MAKE_ENV) $(MAKE) -C $(@D)/build-$(tuple) DESTDIR=$(TARGET_DIR) install
|
|
)
|
|
endef
|
|
endif
|
|
|
|
$(eval $(generic-package))
|
|
$(eval $(host-autotools-package))
|