HIGH · 8.6

CVE-2022-2601

A buffer overflow was found in grub_font_construct_glyph(). A malicious crafted pf2 font can lead to an overflow when calculating the max_glyph_size value, allocating a smaller than needed buffer for ...

Vulnerability Description

A buffer overflow was found in grub_font_construct_glyph(). A malicious crafted pf2 font can lead to an overflow when calculating the max_glyph_size value, allocating a smaller than needed buffer for the glyph, this further leads to a buffer overflow and a heap based out-of-bounds write. An attacker may use this vulnerability to circumvent the secure boot mechanism.

CVSS Score

8.6

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH

Affected Products

VendorProductVersions
GnuGrub2<= 2.06
FedoraprojectFedora37
RedhatEnterprise Linux Eus9.0
RedhatEnterprise Linux For Power Little Endian Eus9.0
RedhatEnterprise Linux Server Aus8.2
RedhatEnterprise Linux Server For Power Little Endian Update Services For Sap Solutions8.1
RedhatEnterprise Linux Server Tus8.2
RedhatEnterprise Linux Server Update Services For Sap Solutions8.1

Related Weaknesses (CWE)

References

FAQ

What is CVE-2022-2601?

CVE-2022-2601 is a vulnerability with a CVSS score of 8.6 (HIGH). A buffer overflow was found in grub_font_construct_glyph(). A malicious crafted pf2 font can lead to an overflow when calculating the max_glyph_size value, allocating a smaller than needed buffer for ...

How severe is CVE-2022-2601?

CVE-2022-2601 has been rated HIGH with a CVSS base score of 8.6/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2022-2601?

Check the references section above for vendor advisories and patch information. Affected products include: Gnu Grub2, Fedoraproject Fedora, Redhat Enterprise Linux Eus, Redhat Enterprise Linux For Power Little Endian Eus, Redhat Enterprise Linux Server Aus.