grub2_2.02+dfsg1-20+deb10u1_source.changes ACCEPTED into proposed-updates->stable-new, proposed-updates

Debian FTP Masters ftpmaster at ftp-master.debian.org
Wed Jul 29 19:47:09 BST 2020



Accepted:

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Sun, 26 Jul 2020 22:38:55 +0100
Source: grub2
Architecture: source
Version: 2.02+dfsg1-20+deb10u1
Distribution: buster-security
Urgency: high
Maintainer: GRUB Maintainers <pkg-grub-devel at alioth-lists.debian.net>
Changed-By: Colin Watson <cjwatson at debian.org>
Changes:
 grub2 (2.02+dfsg1-20+deb10u1) buster-security; urgency=high
 .
   * Backport security patch series from upstream:
     - CVE-2020-10713: yylex: Make lexer fatal errors actually be fatal
     - safemath: Add some arithmetic primitives that check for overflow
     - calloc: Make sure we always have an overflow-checking calloc()
       available
     - CVE-2020-14308: calloc: Use calloc() at most places
     - CVE-2020-14309, CVE-2020-14310, CVE-2020-14311: malloc: Use overflow
       checking primitives where we do complex allocations
     - iso9660: Don't leak memory on realloc() failures
     - font: Do not load more than one NAME section
     - gfxmenu: Fix double free in load_image()
     - xnu: Fix double free in grub_xnu_devprop_add_property()
     - lzma: Make sure we don't dereference past array
     - term: Fix overflow on user inputs
     - udf: Fix memory leak
     - tftp: Do not use priority queue
     - relocator: Protect grub_relocator_alloc_chunk_addr() input args
       against integer underflow/overflow
     - relocator: Protect grub_relocator_alloc_chunk_align() max_addr against
       integer underflow
     - script: Remove unused fields from grub_script_function struct
     - CVE-2020-15706: script: Avoid a use-after-free when redefining a
       function during execution
     - relocator: Fix grub_relocator_alloc_chunk_align() top memory
       allocation
     - hfsplus: fix two more overflows
     - lvm: fix two more potential data-dependent alloc overflows
     - emu: make grub_free(NULL) safe
     - efi: fix some malformed device path arithmetic errors
     - update safemath with fallback code for gcc older than 5.1
     - efi: Fix use-after-free in halt/reboot path
     - linux loader: avoid overflow on initrd size calculation
     - CVE-2020-15707: linux: Fix integer overflows in initrd size handling
   * Apply overflow checking to allocations in Debian patches:
     - CVE-2020-15707: efilinux: Fix integer overflows in grub_cmd_initrd
     - bootp: Fix integer overflow in parse_dhcp6_option
     - unix/config: Fix integer overflow in grub_util_load_config
     - deviceiter: Fix integer overflow in grub_util_iterate_devices
Checksums-Sha1:
 cb6268f3be38c30a8700707b0b8456f458d623c3 6885 grub2_2.02+dfsg1-20+deb10u1.dsc
 7a7b17051b32cef09493aaf21ac54f680ddc37b1 6217988 grub2_2.02+dfsg1.orig.tar.xz
 ab5193b4471ee99b1886339bca507990bb26ac30 1174008 grub2_2.02+dfsg1-20+deb10u1.debian.tar.xz
 a5f173da1b5c4c76bd12ecad29cdd302e1e293da 13404 grub2_2.02+dfsg1-20+deb10u1_source.buildinfo
Checksums-Sha256:
 71cf3e3f2aa5320ad2582c78ef078b9a7dcc47db47fbec98930b7af4bc2cae62 6885 grub2_2.02+dfsg1-20+deb10u1.dsc
 7ceb97380b2924de2b857f1e962f57aa65603a679ce120ee9a1ca11464636a1e 6217988 grub2_2.02+dfsg1.orig.tar.xz
 3d184b6eddac3da8f71ab9608dcdede691be23c65531138e109a98161da839ba 1174008 grub2_2.02+dfsg1-20+deb10u1.debian.tar.xz
 69578012e50d9a2389445011d495233fcf9c8b4f87d4e5620eb8a4ec88cd4d7e 13404 grub2_2.02+dfsg1-20+deb10u1_source.buildinfo
Files:
 7501778bb6adf2ee562d480625a8d428 6885 admin optional grub2_2.02+dfsg1-20+deb10u1.dsc
 20a33f95edb3786aca5e01cd46a87e01 6217988 admin optional grub2_2.02+dfsg1.orig.tar.xz
 6705e3b5ee52fbd88071a712bbaeb7c5 1174008 admin optional grub2_2.02+dfsg1-20+deb10u1.debian.tar.xz
 5ca93d5f19edd8190642a7cc67ee1ec1 13404 admin optional grub2_2.02+dfsg1-20+deb10u1_source.buildinfo

-----BEGIN PGP SIGNATURE-----
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=ZU+N
-----END PGP SIGNATURE-----


Thank you for your contribution to Debian.



More information about the Pkg-grub-devel mailing list