• [gentoo-announce] [ GLSA 202209-12 ] GRUB: Multiple Vulnerabilities

    From glsamaker@gentoo.org@21:1/5 to All on Sun Sep 25 16:00:03 2022
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    Gentoo Linux Security Advisory GLSA 202209-12
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    https://security.gentoo.org/
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

    Severity: High
    Title: GRUB: Multiple Vulnerabilities
    Date: September 25, 2022
    Bugs: #850535, #835082
    ID: 202209-12

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

    Synopsis
    ========

    Multiple vulnerabilities have been discovered in GRUB, the worst of
    which may allow for secureboot bypass.

    Background
    ==========

    GNU GRUB is a multiboot boot loader used by most Linux systems.

    Affected packages
    =================

    -------------------------------------------------------------------
    Package / Vulnerable / Unaffected
    -------------------------------------------------------------------
    1 sys-boot/grub < 2.06 >= 2.06

    Description
    ===========

    Multiple vulnerabilities have been discovered in GRUB. Please review the
    CVE identifiers referenced below for details.

    Impact
    ======

    Please review the referenced CVE identifiers for details.

    Workaround
    ==========

    There is no known workaround at this time.

    Resolution
    ==========

    All GRUB users should upgrade to the latest version:

    # emerge --sync
    # emerge --ask --oneshot --verbose ">=sys-boot/grub-2.06-r3"

    After upgrading, make sure to run the grub-install command with options appropriate for your system. See the GRUB2 Gentoo Wiki page for
    directions. Your system will be vulnerable until this action is
    performed.

    References
    ==========

    [ 1 ] CVE-2021-3695
    https://nvd.nist.gov/vuln/detail/CVE-2021-3695
    [ 2 ] CVE-2021-3696
    https://nvd.nist.gov/vuln/detail/CVE-2021-3696
    [ 3 ] CVE-2021-3697
    https://nvd.nist.gov/vuln/detail/CVE-2021-3697
    [ 4 ] CVE-2021-3981
    https://nvd.nist.gov/vuln/detail/CVE-2021-3981
    [ 5 ] CVE-2022-28733
    https://nvd.nist.gov/vuln/detail/CVE-2022-28733
    [ 6 ] CVE-2022-28734
    https://nvd.nist.gov/vuln/detail/CVE-2022-28734
    [ 7 ] CVE-2022-28735
    https://nvd.nist.gov/vuln/detail/CVE-2022-28735
    [ 8 ] CVE-2022-28736
    https://nvd.nist.gov/vuln/detail/CVE-2022-28736
    [ 9 ] CVE-2022-28737
    https://nvd.nist.gov/vuln/detail/CVE-2022-28737

    Availability
    ============

    This GLSA and any updates to it are available for viewing at
    the Gentoo Security Website:

    https://security.gentoo.org/glsa/202209-12

    Concerns?
    =========

    Security is a primary focus of Gentoo Linux and ensuring the
    confidentiality and security of our users' machines is of utmost
    importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.

    License
    =======

    Copyright 2022 Gentoo Foundation, Inc; referenced text
    belongs to its owner(s).

    The contents of this document are licensed under the
    Creative Commons - Attribution / Share Alike license.

    https://creativecommons.org/licenses/by-sa/2.5
    -----BEGIN PGP SIGNATURE-----

    iQIzBAEBCgAdFiEEpqTA6ABLMxh/aChGFMQkOaVy+9kFAmMwWSYACgkQFMQkOaVy +9lKnA//ZOnRHAt15938iR/jR3I9Jza2Qtu6GydMUlPl6j9pkxuVSXraTJ7umWWQ eKBTJiqOIvd+5Gmn8S/eqobOH+I82Li2Ov2KuTDqnPJoFafIl54aWMaXEixeGIz8 boxTbgGcvqhHeYBStwz593hV7//KuhlUKqTnnJoB1vq5+V7+AFcmzhk+3OWzNJHT T0gsuLi4bdAAGBfsMWru3f6EiM8V0tdbU61eR4nzTjgdqMdl8WrTlK7Hc/InmnJS v55tVH89lszoqVbiFol+cICX9ZY+nPl7ktZSFWht8pv41Q4Q0SH3+EqZnEeQXZUk kDu8I/xWMf6C/sd9lkYuk6QjFLI59skv6/jZT0VmLa0gmlahAuzC/FHsPHxeCeyC Gt0BYZeeECao9beEyYCw8H86gyMbyxckMLEEVnSVqqToROrxU5Wc/hSIG2pA48g9 TocnLX/CFEpqGpenSCiqoSAy/57Z8syzeYWwd90QLd2n18j+83EzmyNxBr3Ps/DO jkgiwawJsd1rgsMname7qtKdrNGRh5wATRgOjoPLCMCmFvImovmN9oSacdvlzUYh EWUSdbR/S2CPGZaA/kgCpQ9q34imcAl8YXBk2y2ujJDamXYtX/qhySITN9JpWVll t4NIWZQA16mt0mL61OaZHVLY1FUUA0/XN+v9Q07F0oMuNZXYKws=
    =FesR
    -----END PGP SIGNATURE-----

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)