Headline
RHSA-2022:8978: Red Hat Security Advisory: grub2 security and bug fix update
An update for grub2 is now available for Red Hat Enterprise Linux 9.0 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
Related CVEs:
- CVE-2022-2601: grub2: Buffer overflow in grub_font_construct_glyph() can lead to out-of-bound write and possible secure boot bypass
- CVE-2022-3775: grub2: Heap based out-of-bounds write when redering certain unicode sequences
Synopsis
Moderate: grub2 security and bug fix update
Type/Severity
Security Advisory: Moderate
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
View affected systems
Topic
An update for grub2 is now available for Red Hat Enterprise Linux 9.0 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
The grub2 packages provide version 2 of the Grand Unified Boot Loader (GRUB), a highly configurable and customizable boot loader with modular architecture. The packages support a variety of kernel formats, file systems, computer architectures, and hardware devices.
Security Fix(es):
- grub2: Buffer overflow in grub_font_construct_glyph() can lead to out-of-bound write and possible secure boot bypass (CVE-2022-2601)
- grub2: Heap based out-of-bounds write when redering certain unicode sequences (CVE-2022-3775)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Bug Fix(es):
- Kernel Panic on Milan when enable SEV/SEV-ES with CPU: 1 PID: 1 Comm: swapper/0 Not tainted (BZ#2130104)
- [RHEL9.0][SecureBoot][Denali/P10] boot process stops at grub prompt after copying the signed grub to prep partition (BZ#2134358)
- RHEL9.0 [MAXconfig]: Denali LPAR crashs while booting MAX config 240c / 64TB - 192 decimal is the biggest partition min value Linux can handle? (BZ#2134434)
- ISST-LTE:[P10]:RPT:After FW update,while activating the lpar dexlp87 went to ERROR state with LED B2008105 - 7E sub return code (BZ#2135288)
Affected Products
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.0 x86_64
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.0 ppc64le
- Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.0 aarch64
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.0 ppc64le
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.0 x86_64
- Red Hat Enterprise Linux Server for ARM 64 - 4 years of updates 9.0 aarch64
Fixes
- BZ - 2112975 - CVE-2022-2601 grub2: Buffer overflow in grub_font_construct_glyph() can lead to out-of-bound write and possible secure boot bypass
- BZ - 2138880 - CVE-2022-3775 grub2: Heap based out-of-bounds write when redering certain unicode sequences
Red Hat Enterprise Linux for x86_64 - Extended Update Support 9.0
SRPM
grub2-2.06-27.el9_0.12.src.rpm
SHA-256: 117ca7d769912eb6b50880ebd534d9115823f8df5f3dbdf0bea4ed8c50d51e16
x86_64
grub2-common-2.06-27.el9_0.12.noarch.rpm
SHA-256: 10f1fefdce6b284aea0294c58a0785dd3c7149f15078c2b775172de15ca0a94e
grub2-debuginfo-2.06-27.el9_0.12.x86_64.rpm
SHA-256: 128e2cde41d81952f353d0164ac7708776d4350a876cdf26ba7bfbe48c407f3f
grub2-debugsource-2.06-27.el9_0.12.x86_64.rpm
SHA-256: 831badee8841adcd1b7f118d346739e121e0108fb6d51cc0bd6ae175bed2b812
grub2-efi-aa64-modules-2.06-27.el9_0.12.noarch.rpm
SHA-256: 6872890be3176ed78766229d133d4bcecd5d9cd41f3d17edcb90fff55881f921
grub2-efi-x64-2.06-27.el9_0.12.x86_64.rpm
SHA-256: 93dadfccb7553034a79fd64515d9299f497ad89ce907c9b099603c9174aa4a85
grub2-efi-x64-cdboot-2.06-27.el9_0.12.x86_64.rpm
SHA-256: 0a27bd0e9d9c3713290f817864d80a69d6b2a991b095145a634025b2fcd17bfe
grub2-efi-x64-modules-2.06-27.el9_0.12.noarch.rpm
SHA-256: 6d63dce5d8204830ed03724bc5413cb402db560181f0c0e096aa59020b15c60c
grub2-emu-debuginfo-2.06-27.el9_0.12.x86_64.rpm
SHA-256: 7cac9d568a2cc554f193c7bedabad3c1d866f1c952c7f1979cfca96d925b4b53
grub2-pc-2.06-27.el9_0.12.x86_64.rpm
SHA-256: 3e3d0c358de7327716567a274a4db70ae50e60b3d38fe6de469992ae4aba5cde
grub2-pc-modules-2.06-27.el9_0.12.noarch.rpm
SHA-256: fed5976adec037f3785c3c4810a2ff51b214f4d23977ea89f3f2ed67b797832a
grub2-tools-2.06-27.el9_0.12.x86_64.rpm
SHA-256: 58edb3ee7a86d7f2df66e4c02d2655d041baa3780356408cc881ba17a34b6aeb
grub2-tools-debuginfo-2.06-27.el9_0.12.x86_64.rpm
SHA-256: 7a502570e71b4788353458821ff63936b055f9eaa7736f50f5d4d5ef5fe9d168
grub2-tools-efi-2.06-27.el9_0.12.x86_64.rpm
SHA-256: 1979e6f688b1a58024d4a9241ff82c5ac58363e9aab6d671ae8bf6a5c515707d
grub2-tools-efi-debuginfo-2.06-27.el9_0.12.x86_64.rpm
SHA-256: a74ecc0cb607594fa3e64f3a2e84a0aa2dcfbcbe514e14f646ba20e622d14ea1
grub2-tools-extra-2.06-27.el9_0.12.x86_64.rpm
SHA-256: 288ca94cdd955405515169c71d5b1d37c9400b22e576c2d95c3e2a94b4a8ae4d
grub2-tools-extra-debuginfo-2.06-27.el9_0.12.x86_64.rpm
SHA-256: 2e0f6c5d796a29f796693142de206ea1828086e6284c13a35d4d6537928173eb
grub2-tools-minimal-2.06-27.el9_0.12.x86_64.rpm
SHA-256: 11078750f66960fcedd21bda1d15172bd281f1ea024604bb5096469e2822519f
grub2-tools-minimal-debuginfo-2.06-27.el9_0.12.x86_64.rpm
SHA-256: b9c70ea3bed34b562d2feea0495779be139a38f3baa4be3f38b3d99981b69294
Red Hat Enterprise Linux for Power, little endian - Extended Update Support 9.0
SRPM
grub2-2.06-27.el9_0.12.src.rpm
SHA-256: 117ca7d769912eb6b50880ebd534d9115823f8df5f3dbdf0bea4ed8c50d51e16
ppc64le
grub2-common-2.06-27.el9_0.12.noarch.rpm
SHA-256: 10f1fefdce6b284aea0294c58a0785dd3c7149f15078c2b775172de15ca0a94e
grub2-debuginfo-2.06-27.el9_0.12.ppc64le.rpm
SHA-256: 9c941ca1d5483de0a60b59d061508240655af8fe12c60edd4d689812f59fb1f3
grub2-debugsource-2.06-27.el9_0.12.ppc64le.rpm
SHA-256: 660b329a33d01814786d31567f55cb0f289c617f118dadb70f36767385007066
grub2-efi-aa64-modules-2.06-27.el9_0.12.noarch.rpm
SHA-256: 6872890be3176ed78766229d133d4bcecd5d9cd41f3d17edcb90fff55881f921
grub2-efi-x64-modules-2.06-27.el9_0.12.noarch.rpm
SHA-256: 6d63dce5d8204830ed03724bc5413cb402db560181f0c0e096aa59020b15c60c
grub2-ppc64le-2.06-27.el9_0.12.ppc64le.rpm
SHA-256: 40cafe19ee56b04bcf28fa663aef91eb44c6c99dc7e4975f80cdb79aa21bdf33
grub2-ppc64le-modules-2.06-27.el9_0.12.noarch.rpm
SHA-256: 0b4f1bb8fb278a010b71c4502cb15c6aca452c45dab54ad131d4b93f4e25d733
grub2-tools-2.06-27.el9_0.12.ppc64le.rpm
SHA-256: d9fe5f91485cbc11713a4faa544fe2e66d7f7dad945779e2898d4c3cdf75ce85
grub2-tools-debuginfo-2.06-27.el9_0.12.ppc64le.rpm
SHA-256: 1f4c1f0535d680c0ff76747ef903a5b3a6f7784679806fc471c3b13307896c5d
grub2-tools-extra-2.06-27.el9_0.12.ppc64le.rpm
SHA-256: b71d9c143db9253c9d8f60b0db67c3922974a579dcfc02496660a5c5e7a9fe93
grub2-tools-extra-debuginfo-2.06-27.el9_0.12.ppc64le.rpm
SHA-256: 7a9175b6fb9f9712eedd0949304b75eae7d080209b16f74a0feb1cb8c83a7fa3
grub2-tools-minimal-2.06-27.el9_0.12.ppc64le.rpm
SHA-256: 38599013cfef2022c577581970abf22c392d0980d3acbcbeda168f55eb9dbdd0
grub2-tools-minimal-debuginfo-2.06-27.el9_0.12.ppc64le.rpm
SHA-256: a7b7812ff3547bdc9f627fe8c4bbe08e78216fa87001255fd6b7fa03e9fd7f0d
Red Hat Enterprise Linux for ARM 64 - Extended Update Support 9.0
SRPM
grub2-2.06-27.el9_0.12.src.rpm
SHA-256: 117ca7d769912eb6b50880ebd534d9115823f8df5f3dbdf0bea4ed8c50d51e16
aarch64
grub2-common-2.06-27.el9_0.12.noarch.rpm
SHA-256: 10f1fefdce6b284aea0294c58a0785dd3c7149f15078c2b775172de15ca0a94e
grub2-debuginfo-2.06-27.el9_0.12.aarch64.rpm
SHA-256: c06de432d8c7a8e50bd71f41f94c0e934ab5700b8eab34206f6f9e23ddcf930a
grub2-debugsource-2.06-27.el9_0.12.aarch64.rpm
SHA-256: 8b1bc024e47df659d0455dd6688d51ed46143682d6e25f4a18b163eeec40efd2
grub2-efi-aa64-2.06-27.el9_0.12.aarch64.rpm
SHA-256: 5a0d7ae512d037f517d2021539f6517f2a437197191764b2bce59d8c9b9ac513
grub2-efi-aa64-cdboot-2.06-27.el9_0.12.aarch64.rpm
SHA-256: f6c78081a15e365369601bf8949846cee6773d763acec40420863f80a2cba919
grub2-efi-aa64-modules-2.06-27.el9_0.12.noarch.rpm
SHA-256: 6872890be3176ed78766229d133d4bcecd5d9cd41f3d17edcb90fff55881f921
grub2-efi-x64-modules-2.06-27.el9_0.12.noarch.rpm
SHA-256: 6d63dce5d8204830ed03724bc5413cb402db560181f0c0e096aa59020b15c60c
grub2-emu-debuginfo-2.06-27.el9_0.12.aarch64.rpm
SHA-256: 3f3f5f34a3411321341bd3c436bd46d852c4dc2f2bbcf85ae93987565d435cb9
grub2-tools-2.06-27.el9_0.12.aarch64.rpm
SHA-256: 818b5b4dcef7266ded3a8c41c434fe8a3c254bc0dc8343c4e422e7979dee65b1
grub2-tools-debuginfo-2.06-27.el9_0.12.aarch64.rpm
SHA-256: e2d27462e766351e9788a9049d81dfc4eca21d6f61e61290a0247036133fc174
grub2-tools-extra-2.06-27.el9_0.12.aarch64.rpm
SHA-256: 55d2f39aed34b5dbb1728f10dc8632d3b3842cd80b7921409e0901fec13142c4
grub2-tools-extra-debuginfo-2.06-27.el9_0.12.aarch64.rpm
SHA-256: 2156b9deb77a063103ac6fd4be32ab88d25b304ce4f1550435b2c32abb17661a
grub2-tools-minimal-2.06-27.el9_0.12.aarch64.rpm
SHA-256: ea642e95686779e7f4ef6b2b9df835ed9f1db3625fd1a71018bbaba4425190a6
grub2-tools-minimal-debuginfo-2.06-27.el9_0.12.aarch64.rpm
SHA-256: 994ede45ea2863bd858fb5db8b494f84531026f5ae9e1eb8629310e7899132e4
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.0
SRPM
grub2-2.06-27.el9_0.12.src.rpm
SHA-256: 117ca7d769912eb6b50880ebd534d9115823f8df5f3dbdf0bea4ed8c50d51e16
ppc64le
grub2-common-2.06-27.el9_0.12.noarch.rpm
SHA-256: 10f1fefdce6b284aea0294c58a0785dd3c7149f15078c2b775172de15ca0a94e
grub2-debuginfo-2.06-27.el9_0.12.ppc64le.rpm
SHA-256: 9c941ca1d5483de0a60b59d061508240655af8fe12c60edd4d689812f59fb1f3
grub2-debugsource-2.06-27.el9_0.12.ppc64le.rpm
SHA-256: 660b329a33d01814786d31567f55cb0f289c617f118dadb70f36767385007066
grub2-efi-aa64-modules-2.06-27.el9_0.12.noarch.rpm
SHA-256: 6872890be3176ed78766229d133d4bcecd5d9cd41f3d17edcb90fff55881f921
grub2-efi-x64-modules-2.06-27.el9_0.12.noarch.rpm
SHA-256: 6d63dce5d8204830ed03724bc5413cb402db560181f0c0e096aa59020b15c60c
grub2-ppc64le-2.06-27.el9_0.12.ppc64le.rpm
SHA-256: 40cafe19ee56b04bcf28fa663aef91eb44c6c99dc7e4975f80cdb79aa21bdf33
grub2-ppc64le-modules-2.06-27.el9_0.12.noarch.rpm
SHA-256: 0b4f1bb8fb278a010b71c4502cb15c6aca452c45dab54ad131d4b93f4e25d733
grub2-tools-2.06-27.el9_0.12.ppc64le.rpm
SHA-256: d9fe5f91485cbc11713a4faa544fe2e66d7f7dad945779e2898d4c3cdf75ce85
grub2-tools-debuginfo-2.06-27.el9_0.12.ppc64le.rpm
SHA-256: 1f4c1f0535d680c0ff76747ef903a5b3a6f7784679806fc471c3b13307896c5d
grub2-tools-extra-2.06-27.el9_0.12.ppc64le.rpm
SHA-256: b71d9c143db9253c9d8f60b0db67c3922974a579dcfc02496660a5c5e7a9fe93
grub2-tools-extra-debuginfo-2.06-27.el9_0.12.ppc64le.rpm
SHA-256: 7a9175b6fb9f9712eedd0949304b75eae7d080209b16f74a0feb1cb8c83a7fa3
grub2-tools-minimal-2.06-27.el9_0.12.ppc64le.rpm
SHA-256: 38599013cfef2022c577581970abf22c392d0980d3acbcbeda168f55eb9dbdd0
grub2-tools-minimal-debuginfo-2.06-27.el9_0.12.ppc64le.rpm
SHA-256: a7b7812ff3547bdc9f627fe8c4bbe08e78216fa87001255fd6b7fa03e9fd7f0d
Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.0
SRPM
grub2-2.06-27.el9_0.12.src.rpm
SHA-256: 117ca7d769912eb6b50880ebd534d9115823f8df5f3dbdf0bea4ed8c50d51e16
x86_64
grub2-common-2.06-27.el9_0.12.noarch.rpm
SHA-256: 10f1fefdce6b284aea0294c58a0785dd3c7149f15078c2b775172de15ca0a94e
grub2-debuginfo-2.06-27.el9_0.12.x86_64.rpm
SHA-256: 128e2cde41d81952f353d0164ac7708776d4350a876cdf26ba7bfbe48c407f3f
grub2-debugsource-2.06-27.el9_0.12.x86_64.rpm
SHA-256: 831badee8841adcd1b7f118d346739e121e0108fb6d51cc0bd6ae175bed2b812
grub2-efi-aa64-modules-2.06-27.el9_0.12.noarch.rpm
SHA-256: 6872890be3176ed78766229d133d4bcecd5d9cd41f3d17edcb90fff55881f921
grub2-efi-x64-2.06-27.el9_0.12.x86_64.rpm
SHA-256: 93dadfccb7553034a79fd64515d9299f497ad89ce907c9b099603c9174aa4a85
grub2-efi-x64-cdboot-2.06-27.el9_0.12.x86_64.rpm
SHA-256: 0a27bd0e9d9c3713290f817864d80a69d6b2a991b095145a634025b2fcd17bfe
grub2-efi-x64-modules-2.06-27.el9_0.12.noarch.rpm
SHA-256: 6d63dce5d8204830ed03724bc5413cb402db560181f0c0e096aa59020b15c60c
grub2-emu-debuginfo-2.06-27.el9_0.12.x86_64.rpm
SHA-256: 7cac9d568a2cc554f193c7bedabad3c1d866f1c952c7f1979cfca96d925b4b53
grub2-pc-2.06-27.el9_0.12.x86_64.rpm
SHA-256: 3e3d0c358de7327716567a274a4db70ae50e60b3d38fe6de469992ae4aba5cde
grub2-pc-modules-2.06-27.el9_0.12.noarch.rpm
SHA-256: fed5976adec037f3785c3c4810a2ff51b214f4d23977ea89f3f2ed67b797832a
grub2-tools-2.06-27.el9_0.12.x86_64.rpm
SHA-256: 58edb3ee7a86d7f2df66e4c02d2655d041baa3780356408cc881ba17a34b6aeb
grub2-tools-debuginfo-2.06-27.el9_0.12.x86_64.rpm
SHA-256: 7a502570e71b4788353458821ff63936b055f9eaa7736f50f5d4d5ef5fe9d168
grub2-tools-efi-2.06-27.el9_0.12.x86_64.rpm
SHA-256: 1979e6f688b1a58024d4a9241ff82c5ac58363e9aab6d671ae8bf6a5c515707d
grub2-tools-efi-debuginfo-2.06-27.el9_0.12.x86_64.rpm
SHA-256: a74ecc0cb607594fa3e64f3a2e84a0aa2dcfbcbe514e14f646ba20e622d14ea1
grub2-tools-extra-2.06-27.el9_0.12.x86_64.rpm
SHA-256: 288ca94cdd955405515169c71d5b1d37c9400b22e576c2d95c3e2a94b4a8ae4d
grub2-tools-extra-debuginfo-2.06-27.el9_0.12.x86_64.rpm
SHA-256: 2e0f6c5d796a29f796693142de206ea1828086e6284c13a35d4d6537928173eb
grub2-tools-minimal-2.06-27.el9_0.12.x86_64.rpm
SHA-256: 11078750f66960fcedd21bda1d15172bd281f1ea024604bb5096469e2822519f
grub2-tools-minimal-debuginfo-2.06-27.el9_0.12.x86_64.rpm
SHA-256: b9c70ea3bed34b562d2feea0495779be139a38f3baa4be3f38b3d99981b69294
Red Hat Enterprise Linux Server for ARM 64 - 4 years of updates 9.0
SRPM
grub2-2.06-27.el9_0.12.src.rpm
SHA-256: 117ca7d769912eb6b50880ebd534d9115823f8df5f3dbdf0bea4ed8c50d51e16
aarch64
grub2-common-2.06-27.el9_0.12.noarch.rpm
SHA-256: 10f1fefdce6b284aea0294c58a0785dd3c7149f15078c2b775172de15ca0a94e
grub2-debuginfo-2.06-27.el9_0.12.aarch64.rpm
SHA-256: c06de432d8c7a8e50bd71f41f94c0e934ab5700b8eab34206f6f9e23ddcf930a
grub2-debugsource-2.06-27.el9_0.12.aarch64.rpm
SHA-256: 8b1bc024e47df659d0455dd6688d51ed46143682d6e25f4a18b163eeec40efd2
grub2-efi-aa64-2.06-27.el9_0.12.aarch64.rpm
SHA-256: 5a0d7ae512d037f517d2021539f6517f2a437197191764b2bce59d8c9b9ac513
grub2-efi-aa64-cdboot-2.06-27.el9_0.12.aarch64.rpm
SHA-256: f6c78081a15e365369601bf8949846cee6773d763acec40420863f80a2cba919
grub2-efi-aa64-modules-2.06-27.el9_0.12.noarch.rpm
SHA-256: 6872890be3176ed78766229d133d4bcecd5d9cd41f3d17edcb90fff55881f921
grub2-efi-x64-modules-2.06-27.el9_0.12.noarch.rpm
SHA-256: 6d63dce5d8204830ed03724bc5413cb402db560181f0c0e096aa59020b15c60c
grub2-emu-debuginfo-2.06-27.el9_0.12.aarch64.rpm
SHA-256: 3f3f5f34a3411321341bd3c436bd46d852c4dc2f2bbcf85ae93987565d435cb9
grub2-tools-2.06-27.el9_0.12.aarch64.rpm
SHA-256: 818b5b4dcef7266ded3a8c41c434fe8a3c254bc0dc8343c4e422e7979dee65b1
grub2-tools-debuginfo-2.06-27.el9_0.12.aarch64.rpm
SHA-256: e2d27462e766351e9788a9049d81dfc4eca21d6f61e61290a0247036133fc174
grub2-tools-extra-2.06-27.el9_0.12.aarch64.rpm
SHA-256: 55d2f39aed34b5dbb1728f10dc8632d3b3842cd80b7921409e0901fec13142c4
grub2-tools-extra-debuginfo-2.06-27.el9_0.12.aarch64.rpm
SHA-256: 2156b9deb77a063103ac6fd4be32ab88d25b304ce4f1550435b2c32abb17661a
grub2-tools-minimal-2.06-27.el9_0.12.aarch64.rpm
SHA-256: ea642e95686779e7f4ef6b2b9df835ed9f1db3625fd1a71018bbaba4425190a6
grub2-tools-minimal-debuginfo-2.06-27.el9_0.12.aarch64.rpm
SHA-256: 994ede45ea2863bd858fb5db8b494f84531026f5ae9e1eb8629310e7899132e4
Related news
Red Hat Security Advisory 2024-2002-03 - An update for grub2 is now available for Red Hat Enterprise Linux 7. Issues addressed include buffer overflow and bypass vulnerabilities.
Gentoo Linux Security Advisory 202311-14 - Multiple vulnerabilities have been discovered in GRUB, which may lead to secure boot circumvention or code execution. Versions greater than or equal to 2.06-r9 are affected.
Ubuntu Security Notice 6355-1 - Daniel Axtens discovered that specially crafted images could cause a heap-based out-of-bonds write. A local attacker could possibly use this to circumvent secure boot protections. Daniel Axtens discovered that specially crafted images could cause out-of-bonds read and write. A local attacker could possibly use this to circumvent secure boot protections. Daniel Axtens discovered that specially crafted images could cause buffer underwrite which allows arbitrary data to be written to a heap. A local attacker could possibly use this to circumvent secure boot protections.
Dell VxRail versions earlier than 7.0.450, contain(s) an OS command injection vulnerability in VxRail Manager. A local authenticated attacker could potentially exploit this vulnerability, leading to the execution of arbitrary OS commands on the application's underlying OS, with the privileges of the vulnerable application. Exploitation may lead to a system take over by an attacker.
Migration Toolkit for Applications 6.0.1 release Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2020-36567: A flaw was found in gin. This issue occurs when the default Formatter for the Logger middleware (LoggerConfig.Formatter), which is included in the Default engine, allows attackers to inject arbitrary log entries by manipulating the request path. * CVE-2021-35065: A vulnerability was found in the glob-parent package. Affected versions of this package are vulnerable to...
Red Hat Security Advisory 2023-0752-01 - The grub2 packages provide version 2 of the Grand Unified Boot Loader, a highly configurable and customizable boot loader with modular architecture. The packages support a variety of kernel formats, file systems, computer architectures, and hardware devices. Issues addressed include buffer overflow, bypass, and out of bounds write vulnerabilities.
An update for grub2 is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2601: A flaw was found where a maliciously crafted pf2 font could lead to an out-of-bounds write in grub2. A successful attack can lead to memory corruption and secure boot circumvention. * CVE-2022-3775: A flaw was found in the grub2 font code. When rendering certain unicode sequences, it fails to properly validate the font width and height. These values...
Submariner 0.14 packages that fix various bugs and add various enhancements that are now available for Red Hat Advanced Cluster Management for Kubernetes version 2.7 Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE links in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2880: A flaw was found in the golang package, where requests forwarded by reverse proxy include the raw query parameters from the inbound request, including unparseable parameters rejected by net/http. This issue could permit query parameter smuggling when a Go ...
Red Hat Security Advisory 2023-0049-01 - The grub2 packages provide version 2 of the Grand Unified Boot Loader, a highly configurable and customizable boot loader with modular architecture. The packages support a variety of kernel formats, file systems, computer architectures, and hardware devices. Issues addressed include buffer overflow, bypass, and out of bounds write vulnerabilities.
An update for grub2 is now available for Red Hat Enterprise Linux 8.4 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2601: grub2: Buffer overflow in grub_font_construct_glyph() can lead to out-of-bound write and possible secure boot bypass * CVE-2022-3775: grub2: Heap based out-of-bounds write when redering certain unicode sequences
An update for grub2 is now available for Red Hat Enterprise Linux 8.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2601: grub2: Buffer overflow in grub_font_construct_glyph() can lead to out-of-bound write and possible secure boot bypass * CVE-2022-3775: grub2: Heap based out-of-bounds write when redering certain unicode sequences
An update for grub2 is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2601: grub2: Buffer overflow in grub_font_construct_glyph() can lead to out-of-bound write and possible secure boot bypass * CVE-2022-3775: grub2: Heap based out-of-bounds write when redering certain unicode sequences
Hello everyone! Great news for my open source Scanvus project! You can now perform vulnerability checks on Linux hosts and docker images not only using the Vulners.com API, but also with the Vulns.io VM API. It’s especially nice that all the code to support the new API was written and contributed by colleagues from Vulns.io. […]
When rendering certain unicode sequences, grub2's font code doesn't proper validate if the informed glyph's width and height is constrained within bitmap size. As consequence an attacker can craft an input which will lead to a out-of-bounds write into grub2's heap, leading to memory corruption and availability issues. Although complex, arbitrary code execution could not be discarded.
A buffer overflow was found in grub_font_construct_glyph(). A malicious crafted pf2 font can lead to an overflow when calculating the max_glyph_size value, allocating a smaller than needed buffer for the glyph, this further leads to a buffer overflow and a heap based out-of-bounds write. An attacker may use this vulnerability to circumvent the secure boot mechanism.
Red Hat Security Advisory 2022-8978-01 - The grub2 packages provide version 2 of the Grand Unified Boot Loader, a highly configurable and customizable boot loader with modular architecture. The packages support a variety of kernel formats, file systems, computer architectures, and hardware devices. Issues addressed include buffer overflow, bypass, and out of bounds write vulnerabilities.
Red Hat Security Advisory 2022-8800-01 - The grub2 packages provide version 2 of the Grand Unified Boot Loader, a highly configurable and customizable boot loader with modular architecture. The packages support a variety of kernel formats, file systems, computer architectures, and hardware devices. Issues addressed include buffer overflow, bypass, and out of bounds write vulnerabilities.
Red Hat Security Advisory 2022-8800-01 - The grub2 packages provide version 2 of the Grand Unified Boot Loader, a highly configurable and customizable boot loader with modular architecture. The packages support a variety of kernel formats, file systems, computer architectures, and hardware devices. Issues addressed include buffer overflow, bypass, and out of bounds write vulnerabilities.
An update for grub2 is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support, Red Hat Enterprise Linux 8.2 Telecommunications Update Service, and Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2601: grub2: Buffer overflow in grub_font_construct_glyph() can lead to out-of-bound write and possible secure boot bypass * CVE-2022-3775: grub2: Heap based out-of-bounds write when redering certain...
An update for grub2 is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support, Red Hat Enterprise Linux 8.2 Telecommunications Update Service, and Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2601: grub2: Buffer overflow in grub_font_construct_glyph() can lead to out-of-bound write and possible secure boot bypass * CVE-2022-3775: grub2: Heap based out-of-bounds write when redering certain...
Red Hat Security Advisory 2022-8494-01 - The grub2 packages provide version 2 of the Grand Unified Boot Loader, a highly configurable and customizable boot loader with modular architecture. The packages support a variety of kernel formats, file systems, computer architectures, and hardware devices. Issues addressed include buffer overflow, bypass, and out of bounds write vulnerabilities.
Red Hat Security Advisory 2022-8494-01 - The grub2 packages provide version 2 of the Grand Unified Boot Loader, a highly configurable and customizable boot loader with modular architecture. The packages support a variety of kernel formats, file systems, computer architectures, and hardware devices. Issues addressed include buffer overflow, bypass, and out of bounds write vulnerabilities.
Debian Linux Security Advisory 5280-1 - Several issues were found in GRUB2's font handling code, which could result in crashes and potentially execution of arbitrary code. These could lead to by-pass of UEFI Secure Boot on affected systems.
Debian Linux Security Advisory 5280-1 - Several issues were found in GRUB2's font handling code, which could result in crashes and potentially execution of arbitrary code. These could lead to by-pass of UEFI Secure Boot on affected systems.
An update for grub2 is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2601: grub2: Buffer overflow in grub_font_construct_glyph() can lead to out-of-bound write and possible secure boot bypass * CVE-2022-3775: grub2: Heap based out-of-bounds write when redering certain unicode sequences
An update for grub2 is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2601: grub2: Buffer overflow in grub_font_construct_glyph() can lead to out-of-bound write and possible secure boot bypass * CVE-2022-3775: grub2: Heap based out-of-bounds write when redering certain unicode sequences