- Oct 02, 2023
-
-
Julian Andres Klode authored
-
Julian Andres Klode authored
-
Mate Kukri authored
This fixes the two CVEs and various other OOB bugs in the ntfs driver. Reported-by:
Maxim Suhanov <dfirblog@gmail.com>
-
- May 15, 2023
-
-
Steve McIntyre authored
-
- May 13, 2023
-
-
Steve McIntyre authored
-
- May 10, 2023
-
-
Steve McIntyre authored
-
- May 02, 2023
-
-
Steve McIntyre authored
-
- Apr 23, 2023
-
-
Steve McIntyre authored
-
Steve McIntyre authored
Closes: #1034409
-
- Apr 21, 2023
-
-
Steve McIntyre authored
-
Steve McIntyre authored
-
Steve McIntyre authored
-
- Apr 20, 2023
-
-
Steve McIntyre authored
-
Steve McIntyre authored
-
Steve McIntyre authored
-
Steve McIntyre authored
-
Steve McIntyre authored
Add debconf logic for GRUB_DISABLE_OS_PROBER to make it easier to control things here. Particularly useful for the installer. Closes: #1031594, #1012865.
-
- Apr 14, 2023
-
-
Steve McIntyre authored
Add arm64-handover-to-kernel-if-sb-enabled.patch See merge request grub-team/grub!32
-
- Apr 03, 2023
-
-
Emanuele Rocca authored
Fix Secure Boot on arm64 with patch arm64-handover-to-kernel-if-sb-enabled.patch. Fix: #1033657
-
- Mar 04, 2023
-
-
Ben Hutchings authored
- disk/cryptodisk: When cheatmounting, use the sector info of the cheat device - osdep/devmapper/getroot: Have devmapper recognize LUKS2 - osdep/devmapper/getroot: Set up cheated LUKS2 cryptodisk mount from DM parameters
-
Steve McIntyre authored
-
Steve McIntyre authored
Thanks for tracking this down Antoine!
-
- Feb 09, 2023
-
-
Steve McIntyre authored
-
- Feb 08, 2023
-
-
Colin Watson authored
I've mostly retired from GRUB maintenance since early 2022, so I think it would be better if I weren't listed as an uploader in bookworm. Thanks to Steve and Julian for picking up the torch!
-
Steve McIntyre authored
Closes: #1030846
-
- Jan 15, 2023
-
-
Steve McIntyre authored
Closes: #1026915. Thanks to Pascal Hambourg for the patch.
-
Steve McIntyre authored
It only causes problems. Closes: #1016737
-
- Dec 29, 2022
-
-
Steve McIntyre authored
Fixes #845683
-
Steve McIntyre authored
to install onto devices
-
Steve McIntyre authored
Apply patch from upstream, Closes: #1001414
-
- Dec 14, 2022
-
-
Steve McIntyre authored
Closes: #1026092
-
- Dec 11, 2022
-
-
Steve McIntyre authored
Also needs backports from upstream commits to fix warnings/errors from using gcc 12: be8eb0eed util/mkimage: Fix dangling pointer may be used error acffb8148 build: Fix -Werror=array-bounds array subscript 0 is outside array bounds 3ce13d974 lib/reed_solomon: Fix array subscript 0 is outside array bounds
-
Steve McIntyre authored
Closes: #1021846. Thanks to программист некто for helping to debug the problem!
-
- Dec 06, 2022
-
-
Steve McIntyre authored
Make font fallback handling work!
-
- Dec 04, 2022
-
-
Steve McIntyre authored
-
Steve McIntyre authored
-
Steve McIntyre authored
Due to a mistake in the buster update that left the CVE-2022-2601 bugs in place, we need to bump SBAT for all of the Debian GRUB binaries. :-(
-
Steve McIntyre authored
The previous security updates disallowed loading unsigned fonts when in SB mode. To make things work again: * Embed the "unicode" font into the embedded memdisk image so it can be loaded. * Add the memdisk to our normal grubx64.efi loader too * Add a patch from Chris Coulson to make the font loader look for fonts in the memdisk whenever they're loaded. Closes: #1024395, #1025352, #1024447
-
- Nov 14, 2022
-
-
Steve McIntyre authored
CVE-2022-2601, CVE-2022-3775 Bump SBAT level to 3 for grub-efi packages
-
- Nov 12, 2022
-
-
Zhang Boyang authored
The out->ncomb is a bit-field of 8 bits. So, the max possible value is 255. However, code in grub_unicode_aglomerate_comb() doesn't check for an overflow when incrementing out->ncomb. If out->ncomb is already 255, after incrementing it will get 0 instead of 256, and cause illegal memory access in subsequent processing. This patch introduces GRUB_UNICODE_NCOMB_MAX to represent the max acceptable value of ncomb. The code now checks for this limit and ignores additional combining characters when limit is reached. Reported-by:
Daniel Axtens <dja@axtens.net> Signed-off-by:
Zhang Boyang <zhangboyang.id@gmail.com> Reviewed-by:
Daniel Kiper <daniel.kiper@oracle.com>
-