CVE-2022-2601
14.12.2022, 21:15
A buffer overflow was found in grub_font_construct_glyph(). A malicious crafted pf2 font can lead to an overflow when calculating the max_glyph_size value, allocating a smaller than needed buffer for the glyph, this further leads to a buffer overflow and a heap based out-of-bounds write. An attacker may use this vulnerability to circumvent the secure boot mechanism.Enginsight
Vendor | Product | Version |
---|---|---|
gnu | grub2 | 𝑥 ≤ 2.06 |
redhat | enterprise_linux_eus | 9.0 |
redhat | enterprise_linux_for_power_little_endian_eus | 9.0 |
redhat | enterprise_linux_server_aus | 8.2 |
redhat | enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions | 8.1 |
redhat | enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions | 8.2 |
redhat | enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions | 9.0 |
redhat | enterprise_linux_server_tus | 8.2 |
redhat | enterprise_linux_server_update_services_for_sap_solutions | 8.1 |
redhat | enterprise_linux_server_update_services_for_sap_solutions | 8.2 |
redhat | enterprise_linux_server_update_services_for_sap_solutions | 9.0 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Ubuntu Product | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
grub2 |
| ||||||||||||||||||||
grub2-signed |
| ||||||||||||||||||||
grub2-unsigned |
|
References