Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2022-2601


A buffer overflow was found in grub_font_construct_glyph(). A malicious crafted pf2 font can lead to an overflow when calculating the max_glyph_size value, allocating a smaller than needed buffer for the glyph, this further leads to a buffer overflow and a heap based out-of-bounds write. An attacker may use this vulnerability to circumvent the secure boot mechanism.


Published

2022-12-14T21:15:10.190

Last Modified

2024-11-21T07:01:19.873

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 8.6 (HIGH)

Weaknesses
  • Type: Primary
    CWE-122

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application gnu grub2 ≤ 2.06 Yes
Operating System fedoraproject fedora 37 Yes
Operating System redhat enterprise_linux_eus 9.0 Yes
Operating System redhat enterprise_linux_for_power_little_endian_eus 9.0 Yes
Operating System redhat enterprise_linux_server_aus 8.2 Yes
Operating System redhat enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions 8.1 Yes
Operating System redhat enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions 8.2 Yes
Operating System redhat enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions 9.0 Yes
Operating System redhat enterprise_linux_server_tus 8.2 Yes
Operating System redhat enterprise_linux_server_update_services_for_sap_solutions 8.1 Yes
Operating System redhat enterprise_linux_server_update_services_for_sap_solutions 8.2 Yes
Operating System redhat enterprise_linux_server_update_services_for_sap_solutions 9.0 Yes

References