{"id":"RLSA-2023:0752","summary":"Moderate: grub2 security update","details":"The grub2 packages provide version 2 of the Grand Unified Boot Loader (GRUB), a highly configurable and customizable boot loader with modular architecture. The packages support a variety of kernel formats, file systems, computer architectures, and hardware devices.\n\nSecurity Fix(es):\n\n* grub2: Buffer overflow in grub_font_construct_glyph() can lead to out-of-bound write and possible secure boot bypass (CVE-2022-2601)\n\n* grub2: Heap based out-of-bounds write when redering certain unicode sequences (CVE-2022-3775)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.","modified":"2026-02-04T11:15:10.533919Z","published":"2023-02-16T06:35:52.323618Z","upstream":["CVE-2022-2601","CVE-2022-3775"],"references":[{"type":"ADVISORY","url":"https://errata.rockylinux.org/RLSA-2023:0752"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2112975"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2138880"}],"affected":[{"package":{"name":"grub2","ecosystem":"Rocky Linux:9","purl":"pkg:rpm/rocky-linux/grub2?distro=rocky-linux-9&epoch=1"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"1:2.06-46.el9_1.3.rocky.0.2"}],"database_specific":{"yum_repository":"BaseOS"}}],"database_specific":{"source":"https://storage.googleapis.com/resf-osv-data/RLSA-2023:0752.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H"}],"credits":[{"name":"Rocky Enterprise Software Foundation"},{"name":"Red Hat"}]}