- Resolves: CVE-2024-45779 CVE-2024-45778 CVE-2025-1118 - Resolves: CVE-2025-0677 CVE-2024-45782 CVE-2025-0690 - Resolves: CVE-2024-45783 CVE-2025-0624 CVE-2024-45776 - Resolves: CVE-2025-0622 CVE-2024-45774 CVE-2024-45775 - Resolves: CVE-2024-45781 CVE-2024-45780 - Resolves: #RHEL-79700 - Resolves: #RHEL-79341 - Resolves: #RHEL-79875 - Resolves: #RHEL-79849 - Resolves: #RHEL-79707 - Resolves: #RHEL-79857 - Resolves: #RHEL-79709 - Resolves: #RHEL-79846 - Resolves: #RHEL-75737 - Resolves: #RHEL-79713 - Resolves: #RHEL-73785 - Resolves: #RHEL-73787 - Resolves: #RHEL-79704 - Resolves: #RHEL-79702 Signed-off-by: Nicolas Frayer <nfrayer@redhat.com>
38 lines
1.3 KiB
Diff
38 lines
1.3 KiB
Diff
From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001
|
|
From: B Horn <b@horn.uk>
|
|
Date: Fri, 19 Apr 2024 22:31:45 +0100
|
|
Subject: [PATCH] commands/hexdump: Disable memory reading in lockdown mode
|
|
|
|
Reported-by: B Horn <b@horn.uk>
|
|
Signed-off-by: B Horn <b@horn.uk>
|
|
Reviewed-by: Daniel Kiper <daniel.kiper@oracle.com>
|
|
---
|
|
grub-core/commands/hexdump.c | 7 ++++++-
|
|
1 file changed, 6 insertions(+), 1 deletion(-)
|
|
|
|
diff --git a/grub-core/commands/hexdump.c b/grub-core/commands/hexdump.c
|
|
index eaa12465b..d6f61d98a 100644
|
|
--- a/grub-core/commands/hexdump.c
|
|
+++ b/grub-core/commands/hexdump.c
|
|
@@ -24,6 +24,7 @@
|
|
#include <grub/lib/hexdump.h>
|
|
#include <grub/extcmd.h>
|
|
#include <grub/i18n.h>
|
|
+#include <grub/lockdown.h>
|
|
|
|
GRUB_MOD_LICENSE ("GPLv3+");
|
|
|
|
@@ -51,7 +52,11 @@ grub_cmd_hexdump (grub_extcmd_context_t ctxt, int argc, char **args)
|
|
length = (state[1].set) ? grub_strtoul (state[1].arg, 0, 0) : 256;
|
|
|
|
if (!grub_strcmp (args[0], "(mem)"))
|
|
- hexdump (skip, (char *) (grub_addr_t) skip, length);
|
|
+ {
|
|
+ if (grub_is_lockdown() == GRUB_LOCKDOWN_ENABLED)
|
|
+ return grub_error (GRUB_ERR_ACCESS_DENIED, N_("memory reading is disabled in lockdown mode"));
|
|
+ hexdump (skip, (char *) (grub_addr_t) skip, length);
|
|
+ }
|
|
else if ((args[0][0] == '(') && (args[0][namelen - 1] == ')'))
|
|
{
|
|
grub_disk_t disk;
|