Lucene search

K
debianDebianDEBIAN:DLA-3190-2:5EC64
HistoryDec 10, 2022 - 8:22 a.m.

[SECURITY] [DLA 3190-2] grub2 security update

2022-12-1008:22:59
lists.debian.org
13

7.1 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H

3.2 Low

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:S/C:N/I:P/A:P

0.0004 Low

EPSS

Percentile

5.3%


Debian LTS Advisory DLA-3190-2 [email protected]
https://www.debian.org/lts/security/ Steve McIntyre
December 10, 2022 https://wiki.debian.org/LTS


Package : grub2
Version : 2.06-3~deb10u3
CVE ID : CVE-2022-2601 CVE-2022-3775
Debian Bug : 1024617

Zhang Boyang reported that the grub2 update released as DLA 3190-1 did
not correctly apply fixes for CVE-2022-2601 and CVE-2022-3775. Updated
packages are now available to address this issue. For reference the
original advisory text follows.

Several issues were found in GRUB2's font handling code, which could
result in crashes and potentially execution of arbitrary code. These
could lead to by-pass of UEFI Secure Boot on affected systems.

Further, issues were found in image loading that could potentially
lead to memory overflows.

For Debian 10 buster, these problems have been fixed in version
2.06-3~deb10u3.

We recommend that you upgrade your grub2 packages.

For the detailed security status of grub2 please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/grub2

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

7.1 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H

3.2 Low

CVSS2

Access Vector

LOCAL

Access Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:S/C:N/I:P/A:P

0.0004 Low

EPSS

Percentile

5.3%