First published: Thu May 26 2022(Updated: )
The GRUB2's shim_lock verifier allows non-kernel files to be loaded on shim-powered secure boot systems. Allowing such files to be loaded may lead to unverified code and modules to be loaded in GRUB2 breaking the secure boot trust-chain.
Credit: security@ubuntu.com security@ubuntu.com security@ubuntu.com
Affected Software | Affected Version | How to fix |
---|---|---|
Gnu Grub2 | >=2.00<2.06-3 | |
ubuntu/grub2 | <2.06-3 | 2.06-3 |
debian/grub2 | 2.06-3~deb10u1 2.06-3~deb10u3 2.06-3~deb11u5 2.06-3~deb11u4 2.06-13 2.12~rc1-9 | |
redhat/grub2 | <1:2.02-123.el8_6.8 | 1:2.02-123.el8_6.8 |
redhat/grub2 | <1:2.02-87.el8_1.10 | 1:2.02-87.el8_1.10 |
redhat/grub2 | <1:2.02-87.el8_2.10 | 1:2.02-87.el8_2.10 |
redhat/grub2 | <1:2.02-99.el8_4.9 | 1:2.02-99.el8_4.9 |
redhat/grub2 | <1:2.06-27.el9_0.7 | 1:2.06-27.el9_0.7 |
redhat/grub | <2.12 | 2.12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2022-28735 is a vulnerability in grub2 that allows non-kernel files to be loaded on shim-powered secure boot systems, breaking the secure boot trust-chain.
The severity of CVE-2022-28735 is high with a severity rating of 7.8.
The affected software versions by CVE-2022-28735 include Red Hat grub2 versions 1:2.02-123.el8_6.8, 1:2.02-87.el8_1.10, 1:2.02-87.el8_2.10, 1:2.02-99.el8_4.9, and 1:2.06-27.el9_0.7, as well as Gnu Grub2 versions up to 2.06-3, Ubuntu grub2 version 2.06-3, and Debian grub2 versions 2.06-3~deb10u1, 2.06-3~deb10u3, 2.06-3~deb11u5, 2.06-3~deb11u4, 2.06-13, and 2.12~rc1-9.
CVE-2022-28735 allows unverified code and modules to be loaded in GRUB2 on shim-powered secure boot systems, compromising the secure boot trust-chain.
To fix CVE-2022-28735, it is recommended to update the affected software versions to the patched versions provided by the respective software vendors.