Lucene search

K
debianDebianDEBIAN:DLA-3190-1:E4C26
HistoryNov 16, 2022 - 9:12 a.m.

[SECURITY] [DLA 3190-1] grub2 security update

2022-11-1609:12:12
lists.debian.org
19
grub2
security update
debian 10

CVSS3

8.6

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

AI Score

8.9

Confidence

High

EPSS

0.001

Percentile

32.6%


Debian LTS Advisory DLA-3190-1 [email protected]
https://www.debian.org/lts/security/ Steve McIntyre
November 16, 2022 https://wiki.debian.org/LTS


Package : grub2
Version : 2.06-3~deb10u2
CVE ID : CVE-2022-2601 CVE-2022-3775

Several issues were found in GRUB2's font handling code, which could
result in crashes and potentially execution of arbitrary code. These
could lead to by-pass of UEFI Secure Boot on affected systems.

Further, issues were found in image loading that could potentially
lead to memory overflows.

For Debian 10 buster, these problems have been fixed in version
2.06-3~deb10u2.

We recommend that you upgrade your grub2 packages.

For the detailed security status of grub2 please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/grub2

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

CVSS3

8.6

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

AI Score

8.9

Confidence

High

EPSS

0.001

Percentile

32.6%