openSUSE Security Update : grub2 (openSUSE-2021-462)

high Nessus Plugin ID 148045

Language:

Synopsis

The remote openSUSE host is missing a security update.

Description

This update for grub2 fixes the following issues :

grub2 implements the new 'SBAT' method for SHIM based secure boot revocation. (bsc#1182057)

- CVE-2020-25632: Fixed a use-after-free in rmmod command (bsc#1176711)

- CVE-2020-25647: Fixed an out-of-bound write in grub_usb_device_initialize() (bsc#1177883)

- CVE-2020-27749: Fixed a stack-based buffer overflow in grub_parser_split_cmdline (bsc#1179264)

- CVE-2020-27779, CVE-2020-14372: Disallow cutmem and acpi commands in secure boot mode (bsc#1179265 bsc#1175970)

- CVE-2021-20225: Fixed a heap out-of-bounds write in short form option parser (bsc#1182262)

- CVE-2021-20233: Fixed a heap out-of-bound write due to mis-calculation of space required for quoting (bsc#1182263)

- Fixed chainloading windows on dual boot machine (bsc#1183073)

This update was imported from the SUSE:SLE-15-SP2:Update update project.

Solution

Update the affected grub2 packages.

See Also

https://bugzilla.opensuse.org/show_bug.cgi?id=1175970

https://bugzilla.opensuse.org/show_bug.cgi?id=1176711

https://bugzilla.opensuse.org/show_bug.cgi?id=1177883

https://bugzilla.opensuse.org/show_bug.cgi?id=1179264

https://bugzilla.opensuse.org/show_bug.cgi?id=1179265

https://bugzilla.opensuse.org/show_bug.cgi?id=1182057

https://bugzilla.opensuse.org/show_bug.cgi?id=1182262

https://bugzilla.opensuse.org/show_bug.cgi?id=1182263

https://bugzilla.opensuse.org/show_bug.cgi?id=1183073

Plugin Details

Severity: High

ID: 148045

File Name: openSUSE-2021-462.nasl

Version: 1.3

Type: local

Agent: unix

Published: 3/24/2021

Updated: 1/8/2024

Supported Sensors: Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.3

CVSS v2

Risk Factor: High

Base Score: 7.2

Temporal Score: 5.6

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2021-20233

CVSS v3

Risk Factor: High

Base Score: 8.2

Temporal Score: 7.4

Vector: CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:grub2-i386-efi-debug, p-cpe:/a:novell:opensuse:grub2-snapper-plugin, p-cpe:/a:novell:opensuse:grub2-x86_64-efi, p-cpe:/a:novell:opensuse:grub2-x86_64-xen, p-cpe:/a:novell:opensuse:grub2-branding-upstream, p-cpe:/a:novell:opensuse:grub2-i386-efi, p-cpe:/a:novell:opensuse:grub2-debugsource, p-cpe:/a:novell:opensuse:grub2-i386-pc-debug, p-cpe:/a:novell:opensuse:grub2-x86_64-efi-debug, cpe:/o:novell:opensuse:15.2, p-cpe:/a:novell:opensuse:grub2-systemd-sleep-plugin, p-cpe:/a:novell:opensuse:grub2-i386-xen, p-cpe:/a:novell:opensuse:grub2-debuginfo, p-cpe:/a:novell:opensuse:grub2, p-cpe:/a:novell:opensuse:grub2-i386-pc

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 3/22/2021

Vulnerability Publication Date: 3/3/2021

Reference Information

CVE: CVE-2020-14372, CVE-2020-25632, CVE-2020-25647, CVE-2020-27749, CVE-2020-27779, CVE-2021-20225, CVE-2021-20233