[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DLA 3190-2] grub2 security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- -------------------------------------------------------------------------
Debian LTS Advisory DLA-3190-2                debian-lts@lists.debian.org
https://www.debian.org/lts/security/                       Steve McIntyre
December 10, 2022                             https://wiki.debian.org/LTS
- -------------------------------------------------------------------------

Package        : grub2
Version        : 2.06-3~deb10u3
CVE ID         : CVE-2022-2601 CVE-2022-3775
Debian Bug     : 1024617

Zhang Boyang reported that the grub2 update released as DLA 3190-1 did
not correctly apply fixes for CVE-2022-2601 and CVE-2022-3775. Updated
packages are now available to address this issue. For reference the
original advisory text follows.

Several issues were found in GRUB2's font handling code, which could
result in crashes and potentially execution of arbitrary code. These
could lead to by-pass of UEFI Secure Boot on affected systems.

Further, issues were found in image loading that could potentially
lead to memory overflows.

For Debian 10 buster, these problems have been fixed in version
2.06-3~deb10u3.

We recommend that you upgrade your grub2 packages.

For the detailed security status of grub2 please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/grub2

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
-----BEGIN PGP SIGNATURE-----
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=YrkQ
-----END PGP SIGNATURE-----


Reply to: