[CLSA-2022:1669390018] grub2: Fix of 7 CVEs
Type:
security
Severity:
Important
Release date:
2022-11-25
Description:
- CVE-2021-3981: Fix default privileges of grub.cfg file - CVE-2022-28736: Fix use-after-free bug when grub_cmd_chainloader is executed more than once before a boot attempt is performed. - CVE-2021-3695: Drop greyscale support to fix heap out-of-bounds write - CVE-2021-3696: Fix out of range insertion into huffman table - CVE-2021-3697: Fix integer undeflow which resulted in wild pointer write - CVE-2022-28733: Fix integer underflow which resulted in subsequent unpleasantness - CVE-2022-28734: Fix erros in handling of split http headers
Updated packages:
  • grub2-common-2.02-106.el8.tuxcare.els2.noarch.rpm
    sha:27c535aa6a3fc0f8ea6c34453f3394bf59558883
  • grub2-efi-ia32-2.02-106.el8.tuxcare.els2.x86_64.rpm
    sha:231b1d69493d353df47e46273aa690262d105e45
  • grub2-efi-ia32-cdboot-2.02-106.el8.tuxcare.els2.x86_64.rpm
    sha:40a3bdb73cebd1c9afa0b985040c0ace23148833
  • grub2-efi-ia32-modules-2.02-106.el8.tuxcare.els2.noarch.rpm
    sha:8989ff950f26f0f9623c6b7ff1623a8c9ab8b0c8
  • grub2-efi-x64-2.02-106.el8.tuxcare.els2.x86_64.rpm
    sha:b0315b3892f277bfbe42f3f39ece188e30beddcc
  • grub2-efi-x64-cdboot-2.02-106.el8.tuxcare.els2.x86_64.rpm
    sha:8f70d68559cd4d0c552773c3d99a27d5a6cc68a9
  • grub2-efi-x64-modules-2.02-106.el8.tuxcare.els2.noarch.rpm
    sha:4531e5249b6f71801758917f9ac924212173b78b
  • grub2-pc-2.02-106.el8.tuxcare.els2.x86_64.rpm
    sha:e84e1f6fbc34c4ead4de516fdbf60eb53ffb6fd3
  • grub2-pc-modules-2.02-106.el8.tuxcare.els2.noarch.rpm
    sha:686e81cfaf552164ecaf36598ae1ddba6ab06090
  • grub2-tools-2.02-106.el8.tuxcare.els2.x86_64.rpm
    sha:537e7b37b95627f0cdd2e88a3ea4edcd1858ceb6
  • grub2-tools-efi-2.02-106.el8.tuxcare.els2.x86_64.rpm
    sha:ea6e4f4a5f0de64595fb2bf9d5db24ded22c3bb7
  • grub2-tools-extra-2.02-106.el8.tuxcare.els2.x86_64.rpm
    sha:03c611eabab2554de49b5b4712e84d9fefd3c98c
  • grub2-tools-minimal-2.02-106.el8.tuxcare.els2.x86_64.rpm
    sha:d21bedbfd2ad39b26ccbe1eab853378ffc8a4114
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.