Debian: DSA-5280-1: grub2 security update | LinuxSecurity.com

- -------------------------------------------------------------------------
Debian Security Advisory DSA-5280-1                   [email protected]
https://www.debian.org/security/                           Steve McIntyre
November 15, 2022                     https://www.debian.org/security/faq
- -------------------------------------------------------------------------

Package        : grub2
CVE ID         : CVE-2022-2601 CVE-2022-3775

Several issues were found in GRUB2's font handling code, which could
result in crashes and potentially execution of arbitrary code. These
could lead to by-pass of UEFI Secure Boot on affected systems.

Further, issues were found in image loading that could potentially
lead to memory overflows.

For the stable distribution (bullseye), these problems have been fixed in
version 2.06-3~deb11u4.

We recommend that you upgrade your grub2 packages.

For the detailed security status of grub2 please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/grub2

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: [email protected]

Debian: DSA-5280-1: grub2 security update

November 15, 2022
Several issues were found in GRUB2's font handling code, which could result in crashes and potentially execution of arbitrary code

Summary

Further, issues were found in image loading that could potentially
lead to memory overflows.

For the stable distribution (bullseye), these problems have been fixed in
version 2.06-3~deb11u4.

We recommend that you upgrade your grub2 packages.

For the detailed security status of grub2 please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/grub2

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: [email protected]

Severity
Several issues were found in GRUB2's font handling code, which could
result in crashes and potentially execution of arbitrary code. These
could lead to by-pass of UEFI Secure Boot on affected systems.

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.