-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================                   Red Hat Security Advisory

Synopsis:          Moderate: grub2 security update
Advisory ID:       RHSA-2023:0047-01
Product:           Red Hat Enterprise Linux
Advisory URL:      https://access.redhat.com/errata/RHSA-2023:0047
Issue date:        2023-01-09
CVE Names:         CVE-2022-2601 CVE-2022-3775 
====================================================================
1. Summary:

An update for grub2 is now available for Red Hat Enterprise Linux 8.4
Extended Update Support.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux BaseOS EUS (v.8.4) - aarch64, noarch, ppc64le, x86_64

3. Description:

The grub2 packages provide version 2 of the Grand Unified Boot Loader
(GRUB), a highly configurable and customizable boot loader with modular
architecture. The packages support a variety of kernel formats, file
systems, computer architectures, and hardware devices.

Security Fix(es):

* grub2: Buffer overflow in grub_font_construct_glyph() can lead to
out-of-bound write and possible secure boot bypass (CVE-2022-2601)

* grub2: Heap based out-of-bounds write when redering certain unicode
sequences (CVE-2022-3775)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

2112975 - CVE-2022-2601 grub2: Buffer overflow in grub_font_construct_glyph() can lead to out-of-bound write and possible secure boot bypass
2138880 - CVE-2022-3775 grub2: Heap based out-of-bounds write when redering certain unicode sequences

6. Package List:

Red Hat Enterprise Linux BaseOS EUS (v.8.4):

Source:
grub2-2.02-99.el8_4.10.src.rpm

aarch64:
grub2-debuginfo-2.02-99.el8_4.10.aarch64.rpm
grub2-debugsource-2.02-99.el8_4.10.aarch64.rpm
grub2-efi-aa64-2.02-99.el8_4.10.aarch64.rpm
grub2-efi-aa64-cdboot-2.02-99.el8_4.10.aarch64.rpm
grub2-tools-2.02-99.el8_4.10.aarch64.rpm
grub2-tools-debuginfo-2.02-99.el8_4.10.aarch64.rpm
grub2-tools-extra-2.02-99.el8_4.10.aarch64.rpm
grub2-tools-extra-debuginfo-2.02-99.el8_4.10.aarch64.rpm
grub2-tools-minimal-2.02-99.el8_4.10.aarch64.rpm
grub2-tools-minimal-debuginfo-2.02-99.el8_4.10.aarch64.rpm

noarch:
grub2-common-2.02-99.el8_4.10.noarch.rpm
grub2-efi-aa64-modules-2.02-99.el8_4.10.noarch.rpm
grub2-efi-ia32-modules-2.02-99.el8_4.10.noarch.rpm
grub2-efi-x64-modules-2.02-99.el8_4.10.noarch.rpm
grub2-pc-modules-2.02-99.el8_4.10.noarch.rpm
grub2-ppc64le-modules-2.02-99.el8_4.10.noarch.rpm

ppc64le:
grub2-debuginfo-2.02-99.el8_4.10.ppc64le.rpm
grub2-debugsource-2.02-99.el8_4.10.ppc64le.rpm
grub2-ppc64le-2.02-99.el8_4.10.ppc64le.rpm
grub2-tools-2.02-99.el8_4.10.ppc64le.rpm
grub2-tools-debuginfo-2.02-99.el8_4.10.ppc64le.rpm
grub2-tools-extra-2.02-99.el8_4.10.ppc64le.rpm
grub2-tools-extra-debuginfo-2.02-99.el8_4.10.ppc64le.rpm
grub2-tools-minimal-2.02-99.el8_4.10.ppc64le.rpm
grub2-tools-minimal-debuginfo-2.02-99.el8_4.10.ppc64le.rpm

x86_64:
grub2-debuginfo-2.02-99.el8_4.10.x86_64.rpm
grub2-debugsource-2.02-99.el8_4.10.x86_64.rpm
grub2-efi-ia32-2.02-99.el8_4.10.x86_64.rpm
grub2-efi-ia32-cdboot-2.02-99.el8_4.10.x86_64.rpm
grub2-efi-x64-2.02-99.el8_4.10.x86_64.rpm
grub2-efi-x64-cdboot-2.02-99.el8_4.10.x86_64.rpm
grub2-pc-2.02-99.el8_4.10.x86_64.rpm
grub2-tools-2.02-99.el8_4.10.x86_64.rpm
grub2-tools-debuginfo-2.02-99.el8_4.10.x86_64.rpm
grub2-tools-efi-2.02-99.el8_4.10.x86_64.rpm
grub2-tools-efi-debuginfo-2.02-99.el8_4.10.x86_64.rpm
grub2-tools-extra-2.02-99.el8_4.10.x86_64.rpm
grub2-tools-extra-debuginfo-2.02-99.el8_4.10.x86_64.rpm
grub2-tools-minimal-2.02-99.el8_4.10.x86_64.rpm
grub2-tools-minimal-debuginfo-2.02-99.el8_4.10.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2022-2601
https://access.redhat.com/security/cve/CVE-2022-3775
https://access.redhat.com/security/updates/classification/#moderate

8. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2023 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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D0vU
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce

RedHat: RHSA-2023-0047:01 Moderate: grub2 security update

An update for grub2 is now available for Red Hat Enterprise Linux 8.4 Extended Update Support

Summary

The grub2 packages provide version 2 of the Grand Unified Boot Loader (GRUB), a highly configurable and customizable boot loader with modular architecture. The packages support a variety of kernel formats, file systems, computer architectures, and hardware devices.
Security Fix(es):
* grub2: Buffer overflow in grub_font_construct_glyph() can lead to out-of-bound write and possible secure boot bypass (CVE-2022-2601)
* grub2: Heap based out-of-bounds write when redering certain unicode sequences (CVE-2022-3775)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.



Summary


Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258

References

https://access.redhat.com/security/cve/CVE-2022-2601 https://access.redhat.com/security/cve/CVE-2022-3775 https://access.redhat.com/security/updates/classification/#moderate

Package List

Red Hat Enterprise Linux BaseOS EUS (v.8.4):
Source: grub2-2.02-99.el8_4.10.src.rpm
aarch64: grub2-debuginfo-2.02-99.el8_4.10.aarch64.rpm grub2-debugsource-2.02-99.el8_4.10.aarch64.rpm grub2-efi-aa64-2.02-99.el8_4.10.aarch64.rpm grub2-efi-aa64-cdboot-2.02-99.el8_4.10.aarch64.rpm grub2-tools-2.02-99.el8_4.10.aarch64.rpm grub2-tools-debuginfo-2.02-99.el8_4.10.aarch64.rpm grub2-tools-extra-2.02-99.el8_4.10.aarch64.rpm grub2-tools-extra-debuginfo-2.02-99.el8_4.10.aarch64.rpm grub2-tools-minimal-2.02-99.el8_4.10.aarch64.rpm grub2-tools-minimal-debuginfo-2.02-99.el8_4.10.aarch64.rpm
noarch: grub2-common-2.02-99.el8_4.10.noarch.rpm grub2-efi-aa64-modules-2.02-99.el8_4.10.noarch.rpm grub2-efi-ia32-modules-2.02-99.el8_4.10.noarch.rpm grub2-efi-x64-modules-2.02-99.el8_4.10.noarch.rpm grub2-pc-modules-2.02-99.el8_4.10.noarch.rpm grub2-ppc64le-modules-2.02-99.el8_4.10.noarch.rpm
ppc64le: grub2-debuginfo-2.02-99.el8_4.10.ppc64le.rpm grub2-debugsource-2.02-99.el8_4.10.ppc64le.rpm grub2-ppc64le-2.02-99.el8_4.10.ppc64le.rpm grub2-tools-2.02-99.el8_4.10.ppc64le.rpm grub2-tools-debuginfo-2.02-99.el8_4.10.ppc64le.rpm grub2-tools-extra-2.02-99.el8_4.10.ppc64le.rpm grub2-tools-extra-debuginfo-2.02-99.el8_4.10.ppc64le.rpm grub2-tools-minimal-2.02-99.el8_4.10.ppc64le.rpm grub2-tools-minimal-debuginfo-2.02-99.el8_4.10.ppc64le.rpm
x86_64: grub2-debuginfo-2.02-99.el8_4.10.x86_64.rpm grub2-debugsource-2.02-99.el8_4.10.x86_64.rpm grub2-efi-ia32-2.02-99.el8_4.10.x86_64.rpm grub2-efi-ia32-cdboot-2.02-99.el8_4.10.x86_64.rpm grub2-efi-x64-2.02-99.el8_4.10.x86_64.rpm grub2-efi-x64-cdboot-2.02-99.el8_4.10.x86_64.rpm grub2-pc-2.02-99.el8_4.10.x86_64.rpm grub2-tools-2.02-99.el8_4.10.x86_64.rpm grub2-tools-debuginfo-2.02-99.el8_4.10.x86_64.rpm grub2-tools-efi-2.02-99.el8_4.10.x86_64.rpm grub2-tools-efi-debuginfo-2.02-99.el8_4.10.x86_64.rpm grub2-tools-extra-2.02-99.el8_4.10.x86_64.rpm grub2-tools-extra-debuginfo-2.02-99.el8_4.10.x86_64.rpm grub2-tools-minimal-2.02-99.el8_4.10.x86_64.rpm grub2-tools-minimal-debuginfo-2.02-99.el8_4.10.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/


Severity
Advisory ID: RHSA-2023:0047-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2023:0047
Issued Date: : 2023-01-09
CVE Names: CVE-2022-2601 CVE-2022-3775

Topic

An update for grub2 is now available for Red Hat Enterprise Linux 8.4Extended Update Support.Red Hat Product Security has rated this update as having a security impactof Moderate. A Common Vulnerability Scoring System (CVSS) base score, whichgives a detailed severity rating, is available for each vulnerability fromthe CVE link(s) in the References section.


Topic


 

Relevant Releases Architectures

Red Hat Enterprise Linux BaseOS EUS (v.8.4) - aarch64, noarch, ppc64le, x86_64


Bugs Fixed

2112975 - CVE-2022-2601 grub2: Buffer overflow in grub_font_construct_glyph() can lead to out-of-bound write and possible secure boot bypass

2138880 - CVE-2022-3775 grub2: Heap based out-of-bounds write when redering certain unicode sequences


Related News