First published: Thu Nov 03 2022(Updated: )
Fedora CoreOS supports setting a GRUB bootloader password using a Butane config. When this feature is enabled, GRUB requires a password to access the GRUB command-line, modify kernel command-line arguments, or boot non-default OSTree deployments. Recent Fedora CoreOS releases have a misconfiguration which allows booting non-default OSTree deployments without entering a password. This allows someone with access to the GRUB menu to boot into an older version of Fedora CoreOS, reverting any security fixes that have recently been applied to the machine. A password is still required to modify kernel command-line arguments and to access the GRUB command line.
Credit: patrick@puiterwijk.org patrick@puiterwijk.org
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Fedora Coreos | >=36.20220820.3.0<37.20221031.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-3675 has a moderate severity level due to its impact on GRUB configuration in Fedora CoreOS.
To fix CVE-2022-3675, ensure that the GRUB bootloader password is correctly configured and verify that Butane configurations are applied properly.
Fedora CoreOS versions between 36.20220820.3.0 and 37.20221031.1.0 are affected by CVE-2022-3675.
The impact of CVE-2022-3675 includes the potential for unauthorized access to GRUB command-line and modification of boot parameters.
A workaround for CVE-2022-3675 is to disable the GRUB password feature until a proper fix can be applied.