openSUSE Security Update : grub2 (openSUSE-2021-462)

high Nessus Plugin ID 148045
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Synopsis

The remote openSUSE host is missing a security update.

Description

This update for grub2 fixes the following issues :

grub2 implements the new 'SBAT' method for SHIM based secure boot revocation. (bsc#1182057)

- CVE-2020-25632: Fixed a use-after-free in rmmod command (bsc#1176711)

- CVE-2020-25647: Fixed an out-of-bound write in grub_usb_device_initialize() (bsc#1177883)

- CVE-2020-27749: Fixed a stack-based buffer overflow in grub_parser_split_cmdline (bsc#1179264)

- CVE-2020-27779, CVE-2020-14372: Disallow cutmem and acpi commands in secure boot mode (bsc#1179265 bsc#1175970)

- CVE-2021-20225: Fixed a heap out-of-bounds write in short form option parser (bsc#1182262)

- CVE-2021-20233: Fixed a heap out-of-bound write due to mis-calculation of space required for quoting (bsc#1182263)

- Fixed chainloading windows on dual boot machine (bsc#1183073)

This update was imported from the SUSE:SLE-15-SP2:Update update project.

Solution

Update the affected grub2 packages.

See Also

https://bugzilla.opensuse.org/show_bug.cgi?id=1175970

https://bugzilla.opensuse.org/show_bug.cgi?id=1176711

https://bugzilla.opensuse.org/show_bug.cgi?id=1177883

https://bugzilla.opensuse.org/show_bug.cgi?id=1179264

https://bugzilla.opensuse.org/show_bug.cgi?id=1179265

https://bugzilla.opensuse.org/show_bug.cgi?id=1182057

https://bugzilla.opensuse.org/show_bug.cgi?id=1182262

https://bugzilla.opensuse.org/show_bug.cgi?id=1182263

https://bugzilla.opensuse.org/show_bug.cgi?id=1183073

Plugin Details

Severity: High

ID: 148045

File Name: openSUSE-2021-462.nasl

Version: 1.2

Type: local

Agent: unix

Published: 3/24/2021

Updated: 3/26/2021

Dependencies: ssh_get_info.nasl

Risk Information

VPR

Risk Factor: High

Score: 7.3

CVSS v2

Risk Factor: High

Base Score: 7.2

Temporal Score: 5.3

Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: E:U/RL:OF/RC:C

CVSS v3

Risk Factor: High

Base Score: 8.2

Temporal Score: 7.1

Vector: CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

Temporal Vector: E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:grub2, p-cpe:/a:novell:opensuse:grub2-branding-upstream, p-cpe:/a:novell:opensuse:grub2-debuginfo, p-cpe:/a:novell:opensuse:grub2-debugsource, p-cpe:/a:novell:opensuse:grub2-i386-efi, p-cpe:/a:novell:opensuse:grub2-i386-efi-debug, p-cpe:/a:novell:opensuse:grub2-i386-pc, p-cpe:/a:novell:opensuse:grub2-i386-pc-debug, p-cpe:/a:novell:opensuse:grub2-i386-xen, p-cpe:/a:novell:opensuse:grub2-snapper-plugin, p-cpe:/a:novell:opensuse:grub2-systemd-sleep-plugin, p-cpe:/a:novell:opensuse:grub2-x86_64-efi, p-cpe:/a:novell:opensuse:grub2-x86_64-efi-debug, p-cpe:/a:novell:opensuse:grub2-x86_64-xen, cpe:/o:novell:opensuse:15.2

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Exploit Ease: No known exploits are available

Patch Publication Date: 3/22/2021

Vulnerability Publication Date: 3/3/2021

Reference Information

CVE: CVE-2020-14372, CVE-2020-25632, CVE-2020-25647, CVE-2020-27749, CVE-2020-27779, CVE-2021-20225, CVE-2021-20233