SUSE-SU-2021:0685-1

See a problem?
Import Source
https://ftp.suse.com/pub/projects/security/osv/SUSE-SU-2021:0685-1.json
JSON Data
https://api.osv.dev/v1/vulns/SUSE-SU-2021:0685-1
Related
Published
2021-03-02T18:06:17Z
Modified
2021-03-02T18:06:17Z
Summary
Security update for grub2
Details

This update for grub2 fixes the following issues:

grub2 now implements the new 'SBAT' method for SHIM based secure boot revocation. (bsc#1182057)

Following security issues are fixed that can violate secure boot constraints:

  • CVE-2020-25632: Fixed a use-after-free in rmmod command (bsc#1176711)
  • CVE-2020-25647: Fixed an out-of-bound write in grubusbdevice_initialize() (bsc#1177883)
  • CVE-2020-27749: Fixed a stack buffer overflow in grubparsersplit_cmdline (bsc#1179264)
  • CVE-2020-27779, CVE-2020-14372: Disallow cutmem and acpi commands in secure boot mode (bsc#1179265 bsc#1175970)
  • CVE-2021-20225: Fixed a heap out-of-bounds write in short form option parser (bsc#1182262)
  • CVE-2021-20233: Fixed a heap out-of-bound write due to mis-calculation of space required for quoting (bsc#1182263)
References

Affected packages

SUSE:Linux Enterprise High Performance Computing 15-ESPOS / grub2

Package

Name
grub2
Purl
purl:rpm/suse/grub2&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015-ESPOS

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.02-19.66.1

Ecosystem specific

{
    "binaries": [
        {
            "grub2-x86_64-efi": "2.02-19.66.1",
            "grub2-systemd-sleep-plugin": "2.02-19.66.1",
            "grub2-snapper-plugin": "2.02-19.66.1",
            "grub2-arm64-efi": "2.02-19.66.1",
            "grub2-x86_64-xen": "2.02-19.66.1",
            "grub2-i386-pc": "2.02-19.66.1",
            "grub2": "2.02-19.66.1"
        }
    ]
}

SUSE:Linux Enterprise High Performance Computing 15-LTSS / grub2

Package

Name
grub2
Purl
purl:rpm/suse/grub2&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015-LTSS

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.02-19.66.1

Ecosystem specific

{
    "binaries": [
        {
            "grub2-x86_64-efi": "2.02-19.66.1",
            "grub2-systemd-sleep-plugin": "2.02-19.66.1",
            "grub2-snapper-plugin": "2.02-19.66.1",
            "grub2-arm64-efi": "2.02-19.66.1",
            "grub2-x86_64-xen": "2.02-19.66.1",
            "grub2-i386-pc": "2.02-19.66.1",
            "grub2": "2.02-19.66.1"
        }
    ]
}

SUSE:Linux Enterprise Server 15-LTSS / grub2

Package

Name
grub2
Purl
purl:rpm/suse/grub2&distro=SUSE%20Linux%20Enterprise%20Server%2015-LTSS

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.02-19.66.1

Ecosystem specific

{
    "binaries": [
        {
            "grub2-s390x-emu": "2.02-19.66.1",
            "grub2-x86_64-efi": "2.02-19.66.1",
            "grub2-systemd-sleep-plugin": "2.02-19.66.1",
            "grub2-snapper-plugin": "2.02-19.66.1",
            "grub2-arm64-efi": "2.02-19.66.1",
            "grub2-x86_64-xen": "2.02-19.66.1",
            "grub2-i386-pc": "2.02-19.66.1",
            "grub2": "2.02-19.66.1",
            "grub2-powerpc-ieee1275": "2.02-19.66.1"
        }
    ]
}

SUSE:Linux Enterprise Server for SAP Applications 15 / grub2

Package

Name
grub2
Purl
purl:rpm/suse/grub2&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.02-19.66.1

Ecosystem specific

{
    "binaries": [
        {
            "grub2-x86_64-efi": "2.02-19.66.1",
            "grub2-snapper-plugin": "2.02-19.66.1",
            "grub2-systemd-sleep-plugin": "2.02-19.66.1",
            "grub2-x86_64-xen": "2.02-19.66.1",
            "grub2-i386-pc": "2.02-19.66.1",
            "grub2": "2.02-19.66.1",
            "grub2-powerpc-ieee1275": "2.02-19.66.1"
        }
    ]
}