Security update for grub2
Announcement ID: | SUSE-SU-2023:1701-1 |
---|---|
Rating: | important |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves two vulnerabilities, contains one feature and has four security fixes can now be installed.
Description:
This security update of grub2 fixes the following issues:
- CVE-2022-2601: Fixed buffer overflow in grub_font_construct_glyph (bsc#1205178).
- CVE-2022-3775: Fixed integer underflow in blit_comb() (bsc#1205182).
-
Bump upstream SBAT generation to 3
-
rebuild the package with the new secure boot key (bsc#1209188).
Other:
- Remove zfs modules (bsc#1205554)
- Make grub.cfg invariant to efi and legacy platforms (bsc#1205200)
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Enterprise Micro 5.1
zypper in -t patch SUSE-SUSE-MicroOS-5.1-2023-1701=1
Package List:
-
SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64)
- grub2-debuginfo-2.04-150300.3.8.1
- grub2-2.04-150300.3.8.1
- grub2-debugsource-2.04-150300.3.8.1
-
SUSE Linux Enterprise Micro 5.1 (noarch)
- grub2-i386-pc-2.04-150300.3.8.1
- grub2-x86_64-xen-2.04-150300.3.8.1
- grub2-x86_64-efi-2.04-150300.3.8.1
- grub2-arm64-efi-2.04-150300.3.8.1
- grub2-snapper-plugin-2.04-150300.3.8.1
-
SUSE Linux Enterprise Micro 5.1 (s390x)
- grub2-s390x-emu-2.04-150300.3.8.1
References:
- https://www.suse.com/security/cve/CVE-2022-2601.html
- https://www.suse.com/security/cve/CVE-2022-3775.html
- https://bugzilla.suse.com/show_bug.cgi?id=1205178
- https://bugzilla.suse.com/show_bug.cgi?id=1205182
- https://bugzilla.suse.com/show_bug.cgi?id=1205200
- https://bugzilla.suse.com/show_bug.cgi?id=1205554
- https://bugzilla.suse.com/show_bug.cgi?id=1209188
- https://bugzilla.suse.com/show_bug.cgi?id=1209829
- https://jira.suse.com/browse/PED-2951