<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="sa-render.xsl"?>
  <update from="huaweicloud.com" type="security" status="stable" version="1">
    <id>HCE1-SA-2024-0050</id>
    <title>An update for grub2 is now available for HCE 1.1</title>
    <severity>Important</severity>
    <release>HCE 1.1</release>
    <issued date="2024-09-27 08:26:20"/>
    <updated date="2024-09-27 08:26:20"/>
    <references>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-3775" id="CVE-2022-3775" title="CVE-2022-3775 Base Score: 7.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-2601" id="CVE-2022-2601" title="CVE-2022-2601 Base Score: 8.6 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" type="cve"/>
    </references>
    <description>Security Fix(es):

When rendering certain unicode sequences, grub2_x27;s font code doesn_x27;t proper validate if the informed glyph_x27;s width and height is constrained within bitmap size. As consequence an attacker can craft an input which will lead to a out-of-bounds write into grub2_x27;s heap, leading to memory corruption and availability issues. Although complex, arbitrary code execution could not be discarded. (CVE-2022-3775)

A buffer overflow was found in grub_font_construct_glyph(). A malicious crafted pf2 font can lead to an overflow when calculating the max_glyph_size value, allocating a smaller than needed buffer for the glyph, this further leads to a buffer overflow and a heap based out-of-bounds write. An attacker may use this vulnerability to circumvent the secure boot mechanism. (CVE-2022-2601)
</description>
    <pkglist>
      <collection short="HCE 1.1" package="grub2">
        <name>HCE 1.1</name>
        <package arch="x86_64" name="grub2" version="2.02" release="0.87.0.2.hce1c.14">
          <filename>grub2-2.02-0.87.0.2.hce1c.14.x86_64.rpm</filename>
        </package>
        <package arch="noarch" name="grub2-common" version="2.02" release="0.87.0.2.hce1c.14">
          <filename>grub2-common-2.02-0.87.0.2.hce1c.14.noarch.rpm</filename>
        </package>
        <package arch="x86_64" name="grub2-efi-ia32" version="2.02" release="0.87.0.2.hce1c.14">
          <filename>grub2-efi-ia32-2.02-0.87.0.2.hce1c.14.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="grub2-efi-x64" version="2.02" release="0.87.0.2.hce1c.14">
          <filename>grub2-efi-x64-2.02-0.87.0.2.hce1c.14.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="grub2-pc" version="2.02" release="0.87.0.2.hce1c.14">
          <filename>grub2-pc-2.02-0.87.0.2.hce1c.14.x86_64.rpm</filename>
        </package>
        <package arch="noarch" name="grub2-pc-modules" version="2.02" release="0.87.0.2.hce1c.14">
          <filename>grub2-pc-modules-2.02-0.87.0.2.hce1c.14.noarch.rpm</filename>
        </package>
        <package arch="x86_64" name="grub2-tools" version="2.02" release="0.87.0.2.hce1c.14">
          <filename>grub2-tools-2.02-0.87.0.2.hce1c.14.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="grub2-tools-extra" version="2.02" release="0.87.0.2.hce1c.14">
          <filename>grub2-tools-extra-2.02-0.87.0.2.hce1c.14.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="grub2-tools-minimal" version="2.02" release="0.87.0.2.hce1c.14">
          <filename>grub2-tools-minimal-2.02-0.87.0.2.hce1c.14.x86_64.rpm</filename>
        </package>
      </collection>
    </pkglist>
  </update>
