First published: Mon Aug 01 2022(Updated: )
A buffer overflow was found in grub_font_construct_glyph(). A malicious crafted pf2 font can lead to an overflow when calculating the max_glyph_size value, allocating a smaller than needed buffer for the glyph, this further leads to a buffer overflow and a heap based out-of-bounds write. An attacker may use this vulnerability to circumvent the secure boot mechanism.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Microsoft Windows 10 | =21H2 | |
Microsoft Windows 11 | =24H2 | |
Microsoft Windows Server 2022 | ||
Microsoft Windows 11 | =23H2 | |
Microsoft Windows Server 2019 | ||
Microsoft Windows 11 | =23H2 | |
Microsoft Windows 10 | =21H2 | |
Microsoft Windows 10 | ||
Microsoft Windows Server 2022 | ||
Microsoft Windows 11 | =24H2 | |
Microsoft Windows 10 | =21H2 | |
Microsoft Windows 10 | =1607 | |
Microsoft Azure Linux 3.0 x64 | ||
Microsoft Windows 10 | =1809 | |
Microsoft Azure Linux 3.0 ARM | ||
Microsoft Windows 11 | =21H2 | |
Microsoft Windows 10 | =1809 | |
Microsoft Windows 10 | =22H2 | |
Microsoft Windows 10 | =1607 | |
Microsoft Windows 10 | =22H2 | |
Microsoft Windows Server 2012 R2 | ||
Microsoft Windows 10 | =22H2 | |
Microsoft Windows 10 | =1809 | |
Microsoft Windows Server 2016 | ||
Microsoft Windows Server 2019 | ||
Microsoft Windows 11 | =22H2 | |
Microsoft Windows Server 2012 R2 | ||
Microsoft Windows 11 | =21H2 | |
Microsoft Windows 11 | =22H2 | |
Microsoft Windows 10 | ||
Microsoft Windows Server 2016 | ||
redhat/grub | <2.06 | 2.06 |
Microsoft Windows Server 2012 x64 | ||
Microsoft Windows Server 2012 x64 | ||
Microsoft CBL-Mariner | ||
Microsoft CBL-Mariner | ||
Microsoft CBL-Mariner | ||
Microsoft CBL-Mariner | ||
Microsoft Windows Server 2022 23H2 | ||
GRUB 2 | <=2.06 | |
Fedora | =37 | |
redhat enterprise Linux eus | =9.0 | |
redhat enterprise Linux for power little endian eus | =9.0 | |
redhat enterprise Linux server aus | =8.2 | |
redhat enterprise Linux server for power little endian update services for sap solutions | =8.1 | |
redhat enterprise Linux server for power little endian update services for sap solutions | =8.2 | |
redhat enterprise Linux server for power little endian update services for sap solutions | =9.0 | |
redhat enterprise Linux server tus | =8.2 | |
redhat enterprise Linux server update services for sap solutions | =8.1 | |
redhat enterprise Linux server update services for sap solutions | =8.2 | |
redhat enterprise Linux server update services for sap solutions | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-2601.
The affected software includes Gnu Grub2, Fedora 37, Redhat Enterprise Linux Eus, Redhat Enterprise Linux For Power Little Endian Eus, Redhat Enterprise Linux Server Aus, Redhat Enterprise Linux Server For Power Little Endian Update Services For Sap Solutions, Redhat Enterprise Linux Server Tus, Redhat Enterprise Linux Server Update Services For Sap Solutions.
CVE-2022-2601 has a severity rating of 8.6 (high).
The common weakness enumerations (CWE) associated with CVE-2022-2601 are CWE-119, CWE-122, and CWE-787.
You can find more information about CVE-2022-2601 at the following references: [1](https://bugzilla.redhat.com/show_bug.cgi?id=2112975#c0), [2](https://security.netapp.com/advisory/ntap-20230203-0004/), [3](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=2142996).