A buffer overflow was found in grub_font_construct_glyph(). A malicious crafted pf2 font can lead to an overflow when calculating the max_glyph_size value, allocating a smaller than needed buffer for the glyph, this further leads to a buffer overflow and a heap based out-of-bounds write. An attacker may use this vulnerability to circumvent the secure boot mechanism.
References
Link | Resource |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=2112975#c0 | Issue Tracking Third Party Advisory |
https://security.gentoo.org/glsa/202311-14 | |
https://security.netapp.com/advisory/ntap-20230203-0004/ |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
25 Nov 2023, 12:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
07 Nov 2023, 03:46
Type | Values Removed | Values Added |
---|---|---|
CWE |
03 Feb 2023, 10:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
16 Dec 2022, 21:29
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:gnu:grub2:*:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.2:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.2:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:8.1:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:9.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:8.1:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:9.0:*:*:*:*:*:*:* cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:9.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_update_services_for_sap_solutions:9.0:*:*:*:*:*:*:* |
|
First Time |
Redhat enterprise Linux Eus
Fedoraproject Redhat Gnu Redhat enterprise Linux For Power Little Endian Eus Redhat enterprise Linux Server Tus Fedoraproject fedora Redhat enterprise Linux Server For Power Little Endian Update Services For Sap Solutions Redhat enterprise Linux Server Update Services For Sap Solutions Redhat enterprise Linux Server Aus Gnu grub2 |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.6 |
References | (MISC) https://bugzilla.redhat.com/show_bug.cgi?id=2112975#c0 - Issue Tracking, Third Party Advisory |
14 Dec 2022, 21:43
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-12-14 21:15
Updated : 2023-12-10 14:48
NVD link : CVE-2022-2601
Mitre link : CVE-2022-2601
CVE.ORG link : CVE-2022-2601
JSON object : View
Products Affected
redhat
- enterprise_linux_for_power_little_endian_eus
- enterprise_linux_server_tus
- enterprise_linux_server_update_services_for_sap_solutions
- enterprise_linux_server_aus
- enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions
- enterprise_linux_eus
gnu
- grub2
fedoraproject
- fedora
CWE
CWE-122
Heap-based Buffer Overflow