Граф коммитов

25 Коммитов

Автор SHA1 Сообщение Дата
Gary Swalling b05435d5ba
Patch grub2 to fix CVE-2021-3695, CVE-2021-3696, CVE-2021-3697, CVE-2022-28733, CVE-2022-28734, CVE-2022-28735, CVE-2022-28736 (#6469)
Backport 30 patches to bring grub 2.06 up to SBAT level 2 and resolve vulnerabilities for CVE-2021-3695, CVE-2021-3696, CVE-2021-3697, CVE-2022-28733, CVE-2022-28734, CVE-2022-28735, and CVE-2022-28736.
2023-10-26 12:45:44 -07:00
Cameron E Baird f7721321ac
feat: Enable grub2-mkconfig generation of grub config (#5989)
* Implement grub2-mkconfig generation

* Introduce grub2-rpm-macros

* Remove mkconfig systemd behavior, move it to grub template. Make grub2-rpm-macros a subpackage under grub2

* Pack AzureLinux-specific grub configuration directory in its own subpackage

* Enable mkconfig flow for kernel-hci

* +kernel-hci-signed

* stop packaging macros in configuration rpm

Signed-Off-By: Cameron Baird <cameronbaird@microsoft.com>
2023-09-25 12:56:58 -07:00
Daniel McIlvaney 81627c8324
Patch CVE-2022-3775 in grub2 (#5654)
Co-authored-by: Dan Streetman <ddstreet@ieee.org>
2023-06-09 16:29:04 -07:00
AZaugg 5d899b321f
Adding XFS as a root filesystem type (#5198)
* Adding XFS as a root filesystem type

Adding support to provision Mariner with a root filesystem
of type xfs

* Allow Grub to boot XFS

Insert the xfs module allowing grub to boot XFS

* Adding xfs progs to toolchain

To support XFS adding xfsprogs into the mariner build
toolchain

* Addresing PR comments

- Removing xfsprogs from toolchain list
- adding xfsprogs to prereq documentation
2023-04-10 15:25:32 -07:00
Mykhailo Bykhovtsev f86eea852a
grub2: patch CVE-2022-2601 in 2.0 (#4511)
* patching CVE-2022-2601

* updating changelog and updating the grub2-efi-binary
2023-01-05 15:26:00 -08:00
joejoew ba759caf3a
grub2: add patch for reseting grub_errno (#3712)
* grub2: add patch for reseting grub_errno

* bump up release version
2022-09-14 13:50:28 -07:00
Minghe Ren e519da0abd
Security changes to meet Azure security baseline (#3713)
* first commit of MarinerFedRamp2.0

* first commit for FedRAMP2.0

* patched all the asc cases in source code

* address Daniel's review comments for Mariner 2.0 FedRAMP

* move dsiabling ICMP redirect from source to packer

* Update SPECS/shadow-utils/shadow-utils.spec

Co-authored-by: Christopher Co <35273088+christopherco@users.noreply.github.com>

* Update SPECS/fedramp/fedramp.spec

Co-authored-by: Christopher Co <35273088+christopherco@users.noreply.github.com>

* address the comments in 2nd round reviews

* add asc.spec to replace fedramp.spec

* delete fedramp spec

* fix typo and remove changes for system-password

* update manifest file

* remove some unnecessary changes

* add empty line at end

* update to pass PR check

* address 1st round review comments

* update changelog for license

* address review comments

* remove ssh access

Co-authored-by: rmhsawyer <mingheren@gmail.com>
Co-authored-by: Christopher Co <35273088+christopherco@users.noreply.github.com>
2022-09-13 11:33:30 -07:00
Henry Li c3d05c2d35
remove provides from unsigned grub2 (#3461)
Co-authored-by: Henry Li <lihl@microsoft.com>
2022-07-29 22:26:55 -07:00
Henry Li 27f25906a2
resolve grub2 CVE (#3393)
Co-authored-by: Henry Li <lihl@microsoft.com>
2022-07-21 16:00:26 -07:00
Henry Li 8e5f41a845
Add second grub efi binary without specifying the prefix directory (#3361)
* staging for now

* update grub2

* add grub pxe binary

* fix mistake in spec

* revert unnecessary changes

* add subpackage and update binary name

* update changes

* Update SPECS-SIGNED/grub2-efi-binary-signed/grub2-efi-binary-signed.spec

Co-authored-by: Christopher Co <35273088+christopherco@users.noreply.github.com>

Co-authored-by: Henry Li <lihl@microsoft.com>
Co-authored-by: Christopher Co <35273088+christopherco@users.noreply.github.com>
2022-07-21 10:44:51 -07:00
Henry Li 02a3af922d
[main] Re-enable tboot in Mariner and Upgrade tboot to v1.10.2 (#2357)
* save changes to kernel and tboot

* save change

* update kernel signature files

* fix manifests

* fix grub2-efi-binary-signed

* update changelog

* fix licesing

Co-authored-by: Henry Li <lihl@microsoft.com>
2022-03-03 15:24:44 -08:00
Andrew Phelps 8c6486dbe1
Use _topdir variable in gen-ld-script.sh (#2249)
* use _topdir

* update spec

* use _topdir in other specs

* linting
2022-02-17 17:00:02 -08:00
Christopher Co 977e74007a
grub2: Update to 2.06 and include tftp support (#2174)
* grub2: Update to 2.06 release

* grub2: Add efinet and tftp modules to grub efi binary

Signed-off-by: Chris Co <chrco@microsoft.com>
2022-02-10 11:48:26 -08:00
Christopher Co 8d6824e872
[main] shim: update shim bootloader (#2173)
* [1.0] shim: update shim bootloader (#2157)

* shim: update key used

Our current keys have a 1 year expiration time, and it will expire
shortly. Update the key to one that will expire in 10/13/22. Ultimately
we plan to move to a longer lived CA cert once that is made available.

* shim: Add critical patches

* shim: Update to new signed shim bootloader binary

New shim bootloader contains the renewed Mariner Secure Boot Production
key embedded inside. And this shim binary itself is signed with the MS
UEFI CA.

* grub: bump release number to force re-signing

In order to not regress current users of the grub2-2.06~rc1-7 package,
bump release number which will cause the newer grubx64.efi inside the
grub2-efi-binary-2.06~rc1-8 package to be signed with the updated secure
boot key that matches with the one embedded in the 15.4-2 shim binary.

* License verified

Signed-off-by: Chris Co <chrco@microsoft.com>
2022-02-09 18:35:20 -08:00
Andrew Phelps 560f9c0eba
Add ELF note metadata (2.0) (#1393)
* add basic ELF note script

* fixes for grub2

* remove change to grub2

* add generate-package-note.py
2021-09-18 12:01:11 -07:00
Pawel Winogrodzki 4ac255ee79
[dev] Adding `Provides` for common `grub2` subpackages. (#1162) 2021-07-20 12:15:55 -07:00
Thomas Crain 64a8a405d2
[dev] Fix build breaks due to Python2 toolchain removal (#982)
* Remove python2 libxml2 package

* Fix grub2

* Ensure python3-libxml2 is installed in toolchain before building itstool
2021-05-25 22:21:15 -07:00
Christopher Co 67cf4f9b65
grub-efi-binary-signed: define new grub2-efi-binary subpackage (#855)
* grub-signed: Commonize on one spec

Use macros to swap spec contents based on build architecture. We will
still create an SRPM per arch, each with a unique name, so there is no
risk of SRPM name collision.

* grub-signed: Define new grub2-efi-binary subpackage

New subpackage will contain the signed grubx64.efi/grubaa64.efi binary.
This package name is identical to the unsigned version and we will
prefer to use this signed version if built.

* grub-signed: rename files

* grub2: bump spec version to match signed version

* Update github action checks

CG manifest, license file, and spec entanglement checks are failing
due to the grub-efi-binary-signed naming change. Update the checks to
account for the new name.

* grub2-signed: rename source0 to match subpackage

Source0 previous pointed to grub2-efi-unsigned rpm which technically
can work but it would be better to use the grub2-efi-binary package
instead because grub2-efi-binary package is ultimately the package we
will be replacing. We can also perform checks to make sure the output
rpm matches the inputs, modulo the signed binary.

Signed-off-by: Chris Co <chrco@microsoft.com>
2021-04-21 20:37:29 -07:00
rlmenge 5ded532076
Add nopatches for tooling (#834) 2021-04-02 21:57:16 -04:00
Christopher Co e1ea8ea060
grub2: Add a few more patches (#809)
Add a few more F34 patches that are useful to carry.

Patches:
- 017: fix for passing the kernel command line
- 037, 052: updates the documentation and makes patch 166 apply cleanly
- 069: Fix for tsc problem
- 166: Prevent user from overwriting signed grub EFI binary when using
grub2-install

Signed-off-by: Chris Co <chrco@microsoft.com>
2021-04-02 15:58:27 -07:00
Christopher Co 7f6819f1dc
grub2: Update to 2.06-rc1 (#781)
Update grub2 from 2.02 to 2.06-rc1 which handles BootHole v2. Additionally, we
drop all previous patches and rebaseline using a minimal number of patches
from FC34. These patches implement Secure Boot Handover protocol (needed
so the TPM Eventlog can be exposed to the kernel for TPM attestation scenarios)
and a few other nice-to-have fixes.

2.06 also introduces a new generation number based revocation mechanism known
as Secure Boot Advanced Targeting (SBAT) into the grub EFI binary. Components
that utilize the SHIM for secure boot will add an .sbat field into their binary's
PE-header, allowing the SHIM to check the component's sbat field against known
good component versions and allow for version-based revocation.

Signed-off-by: Chris Co <chrco@microsoft.com>
2021-03-25 15:06:01 -07:00
Andrew Phelps 283d6cde5a
Fix tests for grub2, perl, and skip libsoup tests (#465)
* fix perl test

* fix grub2 test

* skip libsoup

* cleanup

* update manifests

* update manifests
2020-12-14 19:29:20 -08:00
Pawel Winogrodzki 22ee531895
Fixing CVE-2020-15705 in `grub2`. (#319)
* Applying spec linter's suggestions.

* Adding a patch for CVE-2020-15705.
2020-11-04 10:29:29 -08:00
Chris Co 89382c8efc Introduce grub2-efi-binary-signed-<arch> package
As part of enabling UEFI Secure Boot, the grub2 EFI binary must be
signed with our distro key.

At the moment, the signing infrastructure isn't quite ready to perform
inline signing during package build. So to work around this, we
introduced the grub2-efi-binary-signed-<arch> packages. The purpose
of these packages is to supply a way for signed versions of the
grub efi binary to land on the end-user's filesystem.
2020-08-19 01:48:50 +00:00
Jon Slobodzian b877013b27 Initial CBL-Mariner commit to GitHub 2020-08-06 20:17:52 -07:00