Commit Graph

234 Commits

Author SHA1 Message Date
Jiaying Song
17a65b334d grub: fix CVE-2025-54770 CVE-2025-61661 CVE-2025-61662 CVE-2025-61663 CVE-2025-61664
References:
https://nvd.nist.gov/vuln/detail/CVE-2025-54770
https://nvd.nist.gov/vuln/detail/CVE-2025-61661
https://nvd.nist.gov/vuln/detail/CVE-2025-61662
https://nvd.nist.gov/vuln/detail/CVE-2025-61663
https://nvd.nist.gov/vuln/detail/CVE-2025-61664

(From OE-Core rev: c28fa3e6421257f50d4ae283cca28fadb621f831)

Signed-off-by: Jiaying Song <jiaying.song.cn@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2026-01-02 06:56:54 -08:00
Hitendra Prajapati
09dadcefe3 grub2: mark CVE-2024-2312 as not applicable
This issue is specific to the peimage module that Ubuntu add, and is not
an upstream issue.

(From OE-Core rev: 8d2fe3f403e6435e1ffe122a6776381090752d8a)

(From OE-Core rev: d005eda88dad37f31bdc59e45e20b209f3771a26)

Signed-off-by: Hitendra Prajapati <hprajapati@mvista.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-10-13 12:42:57 -07:00
Ross Burton
2eccfb8b45 grub2: fix CVE-2024-56738
Backport an algorithmic change to grub_crypto_memcmp() so that it
completes in constant time and thus isn't susceptible to side-channel
attacks.

(From OE-Core rev: 319210be147ec57518c237cb705857aeda9943e6)

Signed-off-by: Ross Burton <ross.burton@arm.com>
Signed-off-by: Mathieu Dubois-Briand <mathieu.dubois-briand@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
(cherry picked from commit 30a1cc225a2bd5d044bf608d863a67df3f9c03be)
Signed-off-by: Shubham Pushpkar <spushpka@cisco.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-09-22 13:17:52 -07:00
Peter Marko
700657a6e7 grub: patch CVE-2025-0678 and CVE-2025-1125
Cherry-pick patch mentioning these CVEs.

(From OE-Core rev: d96bf8ec82ed07c006167e15f7aa0d5e81440977)

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-03-15 06:40:08 -07:00
Peter Marko
c5b4efb1b0 grub: patch CVE-2025-0677, CVE-2025-0684, CVE-2025-0685, CVE-2025-0686 and CVE-2025-0689
Cherry-pick patch mentioning these CVEs.

(From OE-Core rev: f25e1296b8265414061b0b8f12110c6ee22bc7be)

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-03-15 06:40:08 -07:00
Peter Marko
6a280848be grub: patch CVE-2024-45778 and CVE-2024-45779
Cherry-pick patch mentioning these CVEs.

(From OE-Core rev: eb9811ef2a38f1dcd4074eef6f809fd63e98454f)

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-03-15 06:40:08 -07:00
Peter Marko
e39736012b grub: patch CVE-2025-1118
Cherry-pick patch mentioning this CVE.

(From OE-Core rev: 77abb78b5d4dd0e54b656170c03ac68b919b8784)

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-03-15 06:40:08 -07:00
Peter Marko
f3aada6039 grub: patch CVE-2025-0690
Cherry-pick patch mentioning this CVE.

(From OE-Core rev: d9fb00f71380ad39ea5b61e60c4f458371460862)

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-03-15 06:40:08 -07:00
Peter Marko
5690f247a4 grub: patch CVE-2024-45777
Cherry-pick patch mentioning this CVE.

(From OE-Core rev: 2ec4bcda16b92cabf7cf5cb7c68cbe45da269364)

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-03-15 06:40:08 -07:00
Peter Marko
322d87b846 grub: patch CVE-2024-45776
Cherry-pick patch mentioning this CVE.

(From OE-Core rev: e1e13086f38b021a8aabfe8d044b5755d62ee846)

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-03-15 06:40:08 -07:00
Peter Marko
c7e339c0c7 grub: patch CVE-2025-0622
Cherry-pick patch mentioning this CVE.

(From OE-Core rev: d9d99bd5baddcb0438e0c28ab6e302ee9fa0c327)

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-03-15 06:40:08 -07:00
Peter Marko
0dedd305c7 grub: patch CVE-2024-45775
Cherry-pick patch mentioning this CVE.

(From OE-Core rev: 4e01993bf71d3b8e2375ab43857b671738953507)

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-03-15 06:40:08 -07:00
Peter Marko
bfc2c48c83 grub: patch CVE-2024-45774
Cherry-pick patch mentioning this CVE.

(From OE-Core rev: f24f2dc0b7504508357cbe5d5f7a577639a6548e)

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-03-15 06:40:08 -07:00
Peter Marko
a608a3df02 grub: patch CVE-2025-0624
Cherry-pick patch mentioning this CVE.

(From OE-Core rev: 0c860bf1765b49a7540ae3cb206ce09cf25f30a7)

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-03-15 06:40:08 -07:00
Peter Marko
fa7c2c327b grub: patch CVE-2024-45783
Cherry-pick patch mentioning this CVE.

(From OE-Core rev: 70a15bc790025e3241274d3e92674928c41537b6)

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-03-15 06:40:08 -07:00
Peter Marko
7ca876a09a grub: patch CVE-2024-45780
Cherry-pick patch mentioning this CVE.

(From OE-Core rev: f3a14813ed012904e64fd9897ea4ddaf622059dd)

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-03-15 06:40:08 -07:00
Peter Marko
678750a33b grub: patch CVE-2024-45782 and CVE-2024-56737
Cherry-pick patch mentioning these CVEs.

(From OE-Core rev: 61268080ba160a4965873ba5aad6ebbfd1ee2fe1)

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-03-15 06:40:08 -07:00
Peter Marko
f475700be6 grup: patch CVE-2024-45781
Cherry-pick patch mentioning this CVE.

(From OE-Core rev: 120d8cc7b91654557a3101a5f8fda44fb703e5b2)

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-03-15 06:40:08 -07:00
Peter Marko
8a84d05ced grub: backport strlcpy function
It is used to fix multiple CVEs.

(From OE-Core rev: c12baf254a37ff4921c2be0e4d3f626a91980d1a)

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-03-15 06:40:08 -07:00
Peter Marko
42a576f335 grub: drop obsolete CVE statuses
CVE-2021-46705 was needed only with 2.06
CVE-2023-4692 and CVE-2023-4693 were fixed in NVD DB meanwhile

(From OE-Core rev: fab492f32a8630a353d307119dd4109dac81ad45)

Signed-off-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2025-03-15 06:40:08 -07:00
Khem Raj
e97af1ca2c grub,grub-efi: Remove -mfpmath=sse on x86
This option fails with clang compiler when testing for soft-float because
OE enforces this option via CCARGS however, gtub's
makefile/configure does disable all sse options when checking for
soft-float support, but it can not disable -mfpmath=sse as its inserted
by OE, therefore remove it in recipe

Fixes build errors seen with clang/musl like on x86
error: the 'sse' unit is not supported with this instruction set

(From OE-Core rev: 17273366f23702077fe7a270afc7b5d26a650bf7)

Signed-off-by: Khem Raj <raj.khem@gmail.com>
Signed-off-by: Alexandre Belloni <alexandre.belloni@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
(cherry picked from commit ad76da4ff6d7110747b620621ae3728de9905465)
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2024-08-01 06:08:09 -07:00
Alexander Kanavin
ade798ec0d grub: mark grub-module-explicitly-keeps-symbole-.module_license.patch as a workaround
(From OE-Core rev: 8c03f8c4916c802e0e6ad483a019fcaa7b09f509)

Signed-off-by: Alexander Kanavin <alex@linutronix.de>
Signed-off-by: Alexandre Belloni <alexandre.belloni@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
(cherry picked from commit 6307adb5b0644845f4062c21ac5717eb62a61dd3)
Signed-off-by: Steve Sakoman <steve@sakoman.com>
2024-07-17 05:36:14 -07:00
Simone Weiß
2bcd651a08 meta: Update CVE_STATUS for incorrect cpes
Set CVE_STATUS as none of the issues apply against the versions
used in the recipes.

(From OE-Core rev: cea8c8bf73e84133f566d1c2ca0637494f2d7afe)

Signed-off-by: Simone Weiß <simone.p.weiss@posteo.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2024-02-24 16:10:23 +00:00
Simone Weiß
dc87dcffd3 grub2: ignore CVE-2024-1048, Redhat only issue
Redhat/Fedora specific as it affects the grub2-set-bootflag extension
added by Redhat to grub.

(From OE-Core rev: 40cd768368167f81de5bb55e9ff0584035f4c1b4)

Signed-off-by: Simone Weiß <simone.p.weiss@posteo.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2024-02-18 22:02:40 +00:00
Ross Burton
43f9098a69 grub2: ignore CVE-2023-4001, this is Red Hat-specific
(From OE-Core rev: f99b25355133fe8f65a55737270e67ea10b79d52)

Signed-off-by: Ross Burton <ross.burton@arm.com>
Signed-off-by: Alexandre Belloni <alexandre.belloni@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2024-02-02 11:06:17 +00:00
Anuj Mittal
fa809fd073 grub2: upgrade 2.06 -> 2.12
Drop patches that have been upstreamed. Refresh others.

This version dropped extra_deps.lst from the tarball [1] and that leads
to build failures. Restore it in do_configure for now.

[1] https://git.savannah.gnu.org/cgit/grub.git/commit/?id=b835601c7639ed1890f2d3db91900a8506011a8e

(From OE-Core rev: 7c8e1e48075f7f54aec9d295605c982f440be5d5)

Signed-off-by: Anuj Mittal <anuj.mittal@intel.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2024-01-24 15:46:19 +00:00
Ming Liu
361cc39ede grub: fs/fat: Don't error when mtime is 0
A issue was found when I run "runqemu genericx86-64 ovmf", grub failed
to boot, it's a known issue has been fixed in grub upstream, backport
the fix.

(From OE-Core rev: 51eab4bb0cae46c9c32d28986eb97badf47594b7)

Signed-off-by: Ming Liu <liu.ming50@gmail.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2024-01-03 23:36:34 +00:00
Xiangyu Chen
8e73cd0445 grub: Fix for CVE-2023-4692 and CVE-2023-4693
CVE: CVE-2023-4692

Crafted file system images can cause heap-based buffer
overflow and may allow arbitrary code execution and secure boot bypass.

Upstream-Status: Backport
[https://git.savannah.gnu.org/cgit/grub.git/commit/?id=43651027d24e62a7a463254165e1e46e42aecdea]

CVE: CVE-2023-4693

There an out-of-bounds read at fs/ntfs.c, a physically present attacker
may leverage that by presenting a specially crafted NTFS file system
image to read arbitrary memory locations. A successful attack may allow
sensitive data cached in memory or EFI variables values to be leaked
presenting a high Confidentiality risk.

Upstream-Status: Backport
[https://git.savannah.gnu.org/cgit/grub.git/commit/?id=0ed2458cc4eff6d9a9199527e2a0b6d445802f94]

(From OE-Core rev: a8bc6f041599ce8da275c163c87f155a2f09369c)

Signed-off-by: Xiangyu Chen <xiangyu.chen@windriver.com>
Signed-off-by: Alexandre Belloni <alexandre.belloni@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2023-11-10 17:44:27 +00:00
Andrej Valek
c15e506a46 cve_check: convert CVE_CHECK_IGNORE to CVE_STATUS
- Try to add convert and apply statuses for old CVEs
- Drop some obsolete ignores, while they are not relevant for current
  version

(From OE-Core rev: 1634ed4048cf56788cd5c2c1bdc979b70afcdcd7)

Signed-off-by: Andrej Valek <andrej.valek@siemens.com>
Reviewed-by: Peter Marko <peter.marko@siemens.com>
Signed-off-by: Alexandre Belloni <alexandre.belloni@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2023-07-21 11:52:26 +01:00
Alexander Kanavin
2734f66555 grub: submit determinism.patch upstream
(From OE-Core rev: 61947762e410c685f667e0af6440fb8a33cd6777)

Signed-off-by: Alexander Kanavin <alex@linutronix.de>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2023-06-15 21:25:42 +01:00
Kai Kang
6066600e80 grub2: support metadata_csum_seed feature
It enable the metadata_csum_seed feature by default in e2fsprogs 1.47.0
and causes grub doesn't work. Backport patch to make grub support this
feature.

(From OE-Core rev: ae3b4588d69e534ac8aff136ed44f3975f5a2d4f)

Signed-off-by: Kai Kang <kai.kang@windriver.com>
Signed-off-by: Alexandre Belloni <alexandre.belloni@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2023-03-07 10:45:25 +00:00
Khem Raj
ff3279d441 grub: Handle R_RISCV_CALL_PLT reloc
These are new in binutils 2.40+

(From OE-Core rev: f2883fb1d7302087479940b422ba836d2fe35fc4)

Signed-off-by: Khem Raj <raj.khem@gmail.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2023-02-24 11:04:27 +00:00
Xiangyu Chen
7ec846be8b grub2: backport patch to fix CVE-2022-2601 CVE-2022-3775
Backport patch from upstream to solve CVE-2022-2601 CVE-2022-3775 dependency:
font: Fix size overflow in grub_font_get_glyph_internal()
(https://git.savannah.gnu.org/cgit/grub.git/commit/?id=9c76ec09ae08155df27cd237eaea150b4f02f532)

Backport patch from upstream to fix following CVEs:
CVE-2022-2601: font: Fix several integer overflows in grub_font_construct_glyph()
(https://git.savannah.gnu.org/cgit/grub.git/commit/?id=768e1ef2fc159f6e14e7246e4be09363708ac39e)
CVE-2022-3775: font: Fix an integer underflow in blit_comb()
(https://git.savannah.gnu.org/cgit/grub.git/commit/?id=992c06191babc1e109caf40d6a07ec6fdef427af)

(From OE-Core rev: fa5a42150098be892246146456faed778e28ef94)

Signed-off-by: Xiangyu Chen <xiangyu.chen@windriver.com>
Signed-off-by: Steve Sakoman <steve@sakoman.com>
Signed-off-by: Liwei Song <liwei.song@windriver.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2022-12-26 18:49:07 +00:00
Xiangyu Chen
7967e2aa0c grub: backport patches to fix CVE-2022-28736
(From OE-Core rev: 278e1a0f679be813553b014544314041502a586a)

Signed-off-by: Xiangyu Chen <xiangyu.chen@windriver.com>
Signed-off-by: Alexandre Belloni <alexandre.belloni@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2022-12-08 10:48:36 +00:00
Mingli Yu
e6dc71b413 grub: disable build on armv7ve/a with hardfp
The commit(75dbdea940 grub: Allow build on armv7ve/a with softfp)
enable build on armv7ve/a with softfp, but it acutally enable
build on armv7ve/a with hardfp altogether and result in below build
failure:
 | checking for compile options to get strict alignment... -mno-unaligned-access
 | checking if compiler generates unaligned accesses... no
 | checking if C symbols get an underscore after compilation... no
 | checking whether target compiler is working... no
 | configure: error: cannot compile for the target

So update the check to disable build on armv7ve/a with hardfp.

(From OE-Core rev: f67b2880fc2cfb21f51216c63b5f24d0524b4278)

Signed-off-by: Mingli Yu <mingli.yu@windriver.com>
Signed-off-by: Alexandre Belloni <alexandre.belloni@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2022-10-26 12:28:39 +01:00
Andrei Gherzan
4a0e2eb3ec grub: Allow build on armv7ve/a with softfp
Grub tries to force the compilation in softfp mode for some known target
CPU. That is because it doesn't use floats or doubles and there are
known limitations of using a configuration with hardfp. There are though
target CPUs that grub won't know how to configure failing with something
similar to:

| checking for options to get soft-float... no
| configure: error: could not force soft-float

This change relaxes a bit the COMPATIBLE_HOST restriction to only apply
for hardfp configuration even for arm7ve/a.

(From OE-Core rev: 75dbdea94057b6977a20fb738c00c226ca694243)

Signed-off-by: Andrei Gherzan <andrei.gherzan@huawei.com>
Signed-off-by: Alexandre Belloni <alexandre.belloni@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2022-09-21 09:20:49 +01:00
Khem Raj
dab9e569c6 grub: Apply backports to fix build with clang on x86
(From OE-Core rev: 2213b6ce1ec944228d7bb3c95f2e02ac0995b5be)

Signed-off-by: Khem Raj <raj.khem@gmail.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2022-09-20 23:17:53 +01:00
Yongxin Liu
d4b6ad56b7 grub2: fix several CVEs
Backport CVE patches from upstream to fix:
  CVE-2021-3695
  CVE-2021-3696
  CVE-2021-3697
  CVE-2022-28733
  CVE-2022-28734
  CVE-2022-28735

Backport the following 5 patches to make CVE patches be applied smoothly.
  video-Remove-trailing-whitespaces.patch
  video-readers-jpeg-Abort-sooner-if-a-read-operation-.patch
  video-readers-jpeg-Refuse-to-handle-multiple-start-o.patch

(From OE-Core rev: db43401a3a4c201f02f4128fa4bac8ce993bfec0)

Signed-off-by: Yongxin Liu <yongxin.liu@windriver.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2022-08-21 22:51:41 +01:00
Ross Burton
ee6f9706de grub: ignore CVE-2021-46705
This is specific to SUSE Linux.

(From OE-Core rev: 594baef3b08d40fbbf1899f4cadeb9931c035c1a)

Signed-off-by: Ross Burton <ross.burton@arm.com>
Signed-off-by: Alexandre Belloni <alexandre.belloni@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2022-03-29 15:59:29 +01:00
Diego Sueiro
7b68b6ff43 grub-efi: Add option to include all available modules
Include all available modules If 'all' is present in GRUB_BUILDIN variable.
To achieve this we need to search for all .mod files in ${B}/grub-core/ and
pass them to grub-mkimage command.

Also, add the verbose option to grub-mkimage.

(From OE-Core rev: ed1bf9aa0af8c12905cf8332bbbb212ab158fe3c)

Signed-off-by: Diego Sueiro <diego.sueiro@arm.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2022-03-12 09:20:03 +00:00
Richard Purdie
71ef319193 meta/scripts: Automated conversion of OE renamed variables
(From OE-Core rev: aa52af4518604b5bf13f3c5e885113bf868d6c81)

Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2022-02-21 23:37:27 +00:00
Khem Raj
d05e919d5a grub: Fix build with bintutils 2.38 on riscv
(From OE-Core rev: d42596457628f41baa5729545e2932c6692f73ee)

Signed-off-by: Khem Raj <raj.khem@gmail.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2022-02-20 16:45:25 +00:00
Richard Purdie
b0130fcf91 meta/meta-selftest/meta-skeleton: Update LICENSE variable to use SPDX license identifiers
An automated conversion using scripts/contrib/convert-spdx-licenses.py to
convert to use the standard SPDX license identifiers. Two recipes in meta-selftest
were not converted as they're that way specifically for testing. A change in
linux-firmware was also skipped and may need a more manual tweak.

(From OE-Core rev: ceda3238cdbf1beb216ae9ddb242470d5dfc25e0)

Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2022-02-20 16:45:25 +00:00
Kamil Dziezyk
641149f449 grub-efi: Add xen_boot support when 'xen' is in DISTRO_FEATURES for aarch64
'xen-boot' module is available only for aarch64.

(From OE-Core rev: bfabc6d4f8742cc1fdeb49c180b0f78faf5739a2)

Signed-off-by: Kamil Dziezyk <kamil.dziezyk@arm.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2022-01-14 09:25:31 +00:00
Yongxin Liu
1431a6f7f1 grub2: fix CVE-2021-3981
(From OE-Core rev: bb554d14142f93c39fd1516a31757006531c348f)

Signed-off-by: Yongxin Liu <yongxin.liu@windriver.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2022-01-04 23:14:05 +00:00
Michael Opdenacker
e6365c9f52 meta: stop using "virtual/" in RPROVIDES and RDEPENDS
Fixes [YOCTO #14538]

Recipes shouldn't use the "virtual/" string in RPROVIDES and RDEPENDS.

That's confusing because "virtual/" has no special meaning in
RPROVIDES and RDEPENDS (unlike in PROVIDES and DEPENDS).

Instead, using "virtual-" instead of "virtual/"
as already done in the glibc recipe.

(From OE-Core rev: 93ac180d8c389f16964bce8bd5538d9389e970e6)

Signed-off-by: Michael Opdenacker <michael.opdenacker@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2021-09-01 18:48:47 +01:00
Richard Purdie
bb6ddc3691 Convert to new override syntax
This is the result of automated script conversion:

scripts/contrib/convert-overrides.py <oe-core directory>

converting the metadata to use ":" as the override character instead of "_".

(From OE-Core rev: 42344347be29f0997cc2f7636d9603b1fe1875ae)

Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2021-08-02 15:44:10 +01:00
Alexander Kanavin
6d698363ae grub: upgrade 2.04+2.06~rc1 -> 2.06
(From OE-Core rev: 0f528608eb48809955b2610ecc4bd689f1cf8899)

Signed-off-by: Alexander Kanavin <alex.kanavin@gmail.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2021-06-17 00:07:05 +01:00
Richard Purdie
8b9bd26295 grub: Exclude CVE-2019-14865 from cve-check
The CVE only applies to RHEL.

(From OE-Core rev: 8cfc3ebe50facb7e34e778f3e264b26cfae20a04)

Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2021-05-21 15:18:23 +01:00
Richard Purdie
1c926417e1 grub2: Add CVE whitelist entries for issues fixed in 2.06
We're using a pre-release version of 2.06 so these issues are fixed but
continue to show up in the checks since it is pre-2.06 and the CPE
entries are "before but excluding 2.06".

Adding these will clean up CVE reports until the 2.06 release comes out.

(From OE-Core rev: 2467ab1554bee3a431636046735e8e369e865bc6)

Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
2021-05-11 11:54:26 +01:00