Debian DLA-3190-1:grub2 - LTS 安全性更新

high Nessus Plugin ID 167748

概要

遠端 Debian 主機上缺少一個或多個安全性更新。

說明

遠端 Debian 10 主機上安裝的多個套件受到 dla-3190 公告中提及的多個弱點影響。

- grub2:grub_font_construct_glyph() 中的緩衝區溢位弱點可導致超出邊界寫入並可能繞過安全開機 (CVE-2022-2601)

- grub2:重新分配特定的 unicode 序列時發生堆積型超出邊界寫入 (CVE-2022-3775)

請注意,Nessus 並未測試這些問題,而是僅依據應用程式自我報告的版本號碼作出判斷。

解決方案

升級 grub2 套件。

針對 Debian 10 buster,已在 2.06-3~deb10u2 版本中修正這些問題。

另請參閱

https://security-tracker.debian.org/tracker/source-package/grub2

https://www.debian.org/lts/security/2022/dla-3190

https://security-tracker.debian.org/tracker/CVE-2022-2601

https://security-tracker.debian.org/tracker/CVE-2022-3775

https://packages.debian.org/source/buster/grub2

Plugin 詳細資訊

嚴重性: High

ID: 167748

檔案名稱: debian_DLA-3190.nasl

版本: 1.4

類型: local

代理程式: unix

已發布: 2022/11/16

已更新: 2023/10/3

支援的感應器: Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Nessus

風險資訊

VPR

風險因素: High

分數: 7.3

CVSS v2

風險因素: High

基本分數: 7.2

時間分數: 5.6

媒介: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS 評分資料來源: CVE-2022-2601

CVSS v3

風險因素: High

基本分數: 8.6

時間分數: 7.7

媒介: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H

時間媒介: CVSS:3.0/E:P/RL:O/RC:C

弱點資訊

CPE: p-cpe:/a:debian:debian_linux:grub-common, p-cpe:/a:debian:debian_linux:grub-coreboot, p-cpe:/a:debian:debian_linux:grub-coreboot-bin, p-cpe:/a:debian:debian_linux:grub-coreboot-dbg, p-cpe:/a:debian:debian_linux:grub-efi, p-cpe:/a:debian:debian_linux:grub-efi-amd64, p-cpe:/a:debian:debian_linux:grub-efi-amd64-bin, p-cpe:/a:debian:debian_linux:grub-efi-amd64-dbg, p-cpe:/a:debian:debian_linux:grub-efi-amd64-signed-template, p-cpe:/a:debian:debian_linux:grub-efi-arm, p-cpe:/a:debian:debian_linux:grub-efi-arm-bin, p-cpe:/a:debian:debian_linux:grub-efi-arm-dbg, p-cpe:/a:debian:debian_linux:grub-efi-arm64, p-cpe:/a:debian:debian_linux:grub-efi-arm64-bin, p-cpe:/a:debian:debian_linux:grub-efi-arm64-dbg, p-cpe:/a:debian:debian_linux:grub-efi-arm64-signed-template, p-cpe:/a:debian:debian_linux:grub-efi-ia32, p-cpe:/a:debian:debian_linux:grub-efi-ia32-bin, p-cpe:/a:debian:debian_linux:grub-efi-ia32-dbg, p-cpe:/a:debian:debian_linux:grub-efi-ia32-signed-template, p-cpe:/a:debian:debian_linux:grub-emu, p-cpe:/a:debian:debian_linux:grub-emu-dbg, p-cpe:/a:debian:debian_linux:grub-firmware-qemu, p-cpe:/a:debian:debian_linux:grub-ieee1275, p-cpe:/a:debian:debian_linux:grub-ieee1275-bin, p-cpe:/a:debian:debian_linux:grub-ieee1275-dbg, p-cpe:/a:debian:debian_linux:grub-linuxbios, p-cpe:/a:debian:debian_linux:grub-pc, p-cpe:/a:debian:debian_linux:grub-pc-bin, p-cpe:/a:debian:debian_linux:grub-pc-dbg, p-cpe:/a:debian:debian_linux:grub-rescue-pc, p-cpe:/a:debian:debian_linux:grub-theme-starfield, p-cpe:/a:debian:debian_linux:grub-uboot, p-cpe:/a:debian:debian_linux:grub-uboot-bin, p-cpe:/a:debian:debian_linux:grub-uboot-dbg, p-cpe:/a:debian:debian_linux:grub-xen, p-cpe:/a:debian:debian_linux:grub-xen-bin, p-cpe:/a:debian:debian_linux:grub-xen-dbg, p-cpe:/a:debian:debian_linux:grub-xen-host, p-cpe:/a:debian:debian_linux:grub2, p-cpe:/a:debian:debian_linux:grub2-common, cpe:/o:debian:debian_linux:10.0

必要的 KB 項目: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

可被惡意程式利用: true

可輕鬆利用: Exploits are available

修補程式發佈日期: 2022/11/16

弱點發布日期: 2022/11/16

參考資訊

CVE: CVE-2022-2601, CVE-2022-3775