summary refs log tree commit diff
path: root/pkgs/tools/misc/grub
Commit message (Collapse)AuthorAge
* Merge pull request #146927 from trofi/fix-grub2-on-binutils-2.36Sandro2022-02-08
|\
| * grub2_xen: pull upstream fix for binutils-2.36Sergei Trofimovich2021-11-21
| | | | | | | | | | | | | | Without the change linkage on binutils-2.36 fails as: ld: section .note.gnu.property VMA [0000000000400158,0000000000400187] overlaps section .bss VMA [000000000000f000,000000000041e1b7]
* | python,pythonPackages: make aliasesRobert Schütz2022-01-16
| | | | | | | | | | Since aliases are disallowed in nixpkgs, this makes usage of Python 2 which is EOL more explicit.
* | Merge master into staging-nextgithub-actions[bot]2021-11-30
|\ \
| * | grub2: fix buildPackage bash shebangArtturin2021-11-27
| | |
| * | grub2: switch to release tarballArtturin2021-11-27
| |/ | | | | | | for the localization files
* / misc: Replace tab indentation with spacesVictor Engmark2021-11-14
|/ | | | | I've tried to be consistent, using four or eight spaces to line up with existing code.
* Merge master into staging-nextgithub-actions[bot]2021-09-11
|\
| * trustedGrub, trustedGrub-for-HP: apply upstream fix for fresh glibcSergei Trofimovich2021-09-11
| |
* | grub: replace name with pname&versionFelix Buehler2021-08-01
|/
* Merge pull request #126585 from helsinki-systems/upd/grub2ajs1242021-07-15
|\ | | | | grub2: 2.06-rc1 -> 2.06
| * grub2: 2.06-rc1 -> 2.06ajs1242021-06-11
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | * GCC 10 support. * clang 10 support. * SBAT support. * LUKS2 support. * Drop small MBR gap support. * Xen Security Modules (XSM/FLASK) support. * The lockdown mechanism similar to the Linux kernel one. * Disable the os-prober by default. * Many backports of GRUB distros specific patches. * BootHole and BootHole2 fixes. * XFS bigtime support. * ...and tons of other fixes and cleanups...
* | grub: latest gnulib requires autoconf 2.64gfrascadorio2021-07-13
|/
* grub2: Add support for armv7l-linuxSamuel Dionne-Riel2021-05-04
|
* grub2: Add support for hiddenentrySamuel Dionne-Riel2021-05-01
| | | | The iso image will use this to allow switching to the text console.
* Merge pull request #119711 from delroth/grub2-crossSamuel Dionne-Riel2021-05-01
|\ | | | | grub2_efi: fix cross-compilation
| * grub2_efi: fix cross-compilationPierre Bourdon2021-05-01
| |
* | grub2: Add samueldr as maintainerSamuel Dionne-Riel2021-04-25
|/
* grub: 2.0.4 -> 2.0.6-rc1Martin Weinelt2021-03-23
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Quoting from https://lists.gnu.org/archive/html/grub-devel/2021-03/msg00007.html: ******************************************************************************* CVE-2020-14372 grub2: The acpi command allows privileged user to load crafted ACPI tables when Secure Boot is enabled CWE-184 7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H GRUB2 enables the use of the command acpi even when Secure Boot is signaled by the firmware. An attacker with local root privileges to can drop a small SSDT in /boot/efi and modify grub.cfg to instruct grub to load said SSDT. The SSDT then gets run by the kernel and it overwrites the kernel lock down configuration enabling the attacker to load unsigned kernel modules and kexec unsigned code. Reported-by: Máté Kukri ******************************************************************************* CVE-2020-25632 grub2: Use-after-free in rmmod command CWE-416 7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H The rmmod implementation for GRUB2 is flawed, allowing an attacker to unload a module used as dependency without checking if any other dependent module is still loaded. This leads to an use-after-free scenario possibly allowing an attacker to execute arbitrary code and by-pass Secure Boot protections. Reported-by: Chris Coulson (Canonical) ******************************************************************************* CVE-2020-25647 grub2: Out-of-bound write in grub_usb_device_initialize() CWE-787 6.9/CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H grub_usb_device_initialize() is called to handle USB device initialization. It reads out the descriptors it needs from the USB device and uses that data to fill in some USB data structures. grub_usb_device_initialize() performs very little bounds checking and simply assumes the USB device provides sane values. This behavior can trigger memory corruption. If properly exploited, this would lead to arbitrary code execution allowing the attacker to by-pass Secure Boot mechanism. Reported-by: Joseph Tartaro (IOActive) and Ilja van Sprundel (IOActive) ******************************************************************************* CVE-2020-27749 grub2: Stack buffer overflow in grub_parser_split_cmdline CWE-121 7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H grub_parser_split_cmdline() expands variable names present in the supplied command line in to their corresponding variable contents and uses a 1kB stack buffer for temporary storage without sufficient bounds checking. If the function is called with a command line that references a variable with a sufficiently large payload, it is possible to overflow the stack buffer, corrupt the stack frame and control execution. An attacker may use this to circumvent Secure Boot protections. Reported-by: Chris Coulson (Canonical) ******************************************************************************* CVE-2020-27779 grub2: The cutmem command allows privileged user to remove memory regions when Secure Boot is enabled CWE-285 7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H The GRUB2's cutmem command does not honor Secure Boot locking. This allows an privileged attacker to remove address ranges from memory creating an opportunity to circumvent Secure Boot protections after proper triage about grub's memory layout. Reported-by: Teddy Reed ******************************************************************************* CVE-2021-3418 - grub2: GRUB 2.05 reintroduced CVE-2020-15705 CWE-281 6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H The GRUB2 upstream reintroduced the CVE-2020-15705. This refers to a distro specific flaw which made upstream in the mentioned version. If certificates that signed GRUB2 are installed into db, GRUB2 can be booted directly. It will then boot any kernel without signature validation. The booted kernel will think it was booted in Secure Boot mode and will implement lock down, yet it could have been tampered. This flaw only affects upstream and distributions using the shim_lock verifier. Reported-by: Dimitri John Ledkov (Canonical) ******************************************************************************* CVE-2021-20225 grub2: Heap out-of-bounds write in short form option parser CWE-787 7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H The option parser in GRUB2 allows an attacker to write past the end of a heap-allocated buffer by calling certain commands with a large number of specific short forms of options. Reported-by: Daniel Axtens (IBM) ******************************************************************************* CVE-2021-20233 grub2: Heap out-of-bound write due to mis-calculation of space required for quoting CWE-787 7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H There's a flaw on GRUB2 menu rendering code setparam_prefix() in the menu rendering code performs a length calculation on the assumption that expressing a quoted single quote will require 3 characters, while it actually requires 4 characters. This allow an attacker to corrupt memory by one byte for each quote in the input. Reported-by: Daniel Axtens (IBM)
* grub2: add passthru.testsRyan Burns2021-02-17
|
* grub2: fix cross-compilationRyan Burns2021-02-17
| | | | | * gettext is used for native binaries, not hosted libs * grub2 expects `BUILD_CC` to point to a native C compiler
* grub2: fix grub-kbdcompMatthias Devlamynck2021-02-03
| | | | | The grub-kbdcomp command was calling ckbcomp directly without patching to provide its path in the nix store.
* grub2: Properly disable zfs by defaultmohe20152021-01-21
|
* pkgs/tools: pkgconfig -> pkg-configBen Siraphob2021-01-16
|
* pkgs/tools: stdenv.lib -> libBen Siraphob2021-01-15
|
* treewide: with stdenv.lib; in meta -> with lib;Profpatsch2021-01-11
| | | | | | | | | | | | | | | | | | | Part of: https://github.com/NixOS/nixpkgs/issues/108938 meta = with stdenv.lib; is a widely used pattern. We want to slowly remove the `stdenv.lib` indirection and encourage people to use `lib` directly. Thus let’s start with the meta field. This used a rewriting script to mostly automatically replace all occurances of this pattern, and add the `lib` argument to the package header if it doesn’t exist yet. The script in its current form is available at https://cs.tvl.fyi/depot@2f807d7f141068d2d60676a89213eaa5353ca6e0/-/blob/users/Profpatsch/nixpkgs-rewriter/default.nix
* grub2: use python3 by defaultNathan van Doorn2020-08-28
| | | | It should work fine with either 2 or 3 (I'm pretty sure Arch uses 3, for example), and we should be aiming to move away from python 2 wherever possible
* libusb-compat-0_1: rename from libusbJan Tojnar2020-04-28
|
* treewide: Per RFC45, remove all unquoted URLsMichael Reilly2020-04-10
|
* grub2: simplify gnulib usageBenno Fünfstück2020-02-23
|
* Merge branch 'master' into stagingVladimír Čunát2019-09-02
|\
| * grub2: 2.04-rc1 -> 2.04 (#67622)Andreas Wiese2019-09-02
| |
* | treewide: remove redundant quotesvolth2019-08-26
|/
* treewide: name -> pnamevolth2019-08-17
|
* grub: 2.02 -> 2.04-rc1volth2019-05-11
|
* grub2: patch to work with updated binutilsVladimír Čunát2019-02-20
| | | | | This blocked some EFI stuff and consequently the channels. I would fetchpatch, but their cgit server won't work on this commit.
* treewide: use ${stdenv.shell} instead of /bin/sh where possiblernhmjoj2019-01-16
|
* treewide: remove paxutils from stdenvJörg Thalheim2018-12-22
| | | | | | | More then one year ago we removed grsecurity kernels from nixpkgs: https://github.com/NixOS/nixpkgs/pull/25277 This removes now also paxutils from stdenv.
* grub: add patch for XFS sparse inode featureMarkus Kowalewski2018-12-10
| | | | | | | | xfsprogs-4.16 introduced an new on disk format feature that is not recognized properly by grub. This patch allows grub to access XFS filesystem created with xfsprogs >= 4.16. This upstream patch can be removed for grub-2.03.
* Treewide: use HTTPS on GNU domainsc0bw3b2018-12-02
| | | | | | | | | | | HTTP -> HTTPS for : - http://gnu.org/ - http://www.gnu.org/ - http://elpa.gnu.org/ - http://lists.gnu.org/ - http://gcc.gnu.org/ - http://ftp.gnu.org/ (except in fetchurl mirrors) - http://bugs.gnu.org/
* grub: fetch from HTTPS instead of FTP; update meta (#48137)Benjamin Hipple2018-10-10
| | | | HTTPS is unlikely to be worse and is often better than FTP. Aside from being faster, there are many networking setups where outgoing FTP traffic is blocked.
* grub: grub-0.97-patch-1.15 -> grub-0.97-73Samuel Dionne-Riel2018-09-17
| | | | | | Instead of using Gentoo's patchset, uses Debian's. Gentoo's doesn't work anymore.
* reewide: Purge all uses `stdenv.system` and top-level `system`John Ericson2018-08-30
| | | | It is deprecated and will be removed after 18.09.
* grub-0.97: add licenseMarkus Kowalewski2018-08-16
|
* pkgs/*: remove unreferenced function argumentsvolth2018-07-21
|
* treewide: remove aliases in nixpkgsMatthew Bauer2018-07-18
| | | | | | | | | | | | | | | | | | This makes the command ‘nix-env -qa -f. --arg config '{skipAliases = true;}'’ work in Nixpkgs. Misc... - qtikz: use libsForQt5.callPackage This ensures we get the right poppler. - rewrites: docbook5_xsl -> docbook_xsl_ns docbook_xml_xslt -> docbook_xsl diffpdf: fixup
* grub2: compile grub-mount as wellSymphorien Gibol2018-05-26
| | | | | It is a dependency of os-prober >= 1.75 https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=860833#23
* tree-wide: platforms = platforms.gnu; -> platforms = gnu ++ linuxWill Dietz2018-04-30
| | | | | | | | | | | | | | "platforms.gnu" has been linux-only since at least 17.03: $ nix eval -f channel:nixos-17.03 lib.platforms.gnu [ "i686-linux" "x86_64-linux" "armv5tel-linux" "armv6l-linux" "armv7l-linux" "aarch64-linux" "mips64el-linux" ] Unlike platforms.linux, platforms.gnu indicates "must use glibc" which for the most part is not intended. Replacing platforms.gnu with platforms.linux would be the same "today" but let's err on preserving existing behavior and be optimistic about platforms these packages work on.
* grub2: extend platforms to include all linuxWill Dietz2018-03-26
| | | | This works (and is needed) on musl-based linux too!
* grub2: pkgconfig to fix finding freetypeVladimír Čunát2018-03-16
|