{"id":"CVE-2022-2601","details":"A buffer overflow was found in grub_font_construct_glyph(). A malicious crafted pf2 font can lead to an overflow when calculating the max_glyph_size value, allocating a smaller than needed buffer for the glyph, this further leads to a buffer overflow and a heap based out-of-bounds write. An attacker may use this vulnerability to circumvent the secure boot mechanism.","modified":"2026-03-13T05:41:04.988848Z","published":"2022-12-14T21:15:10.190Z","related":["ALSA-2023:0049","ALSA-2023:0752","SUSE-SU-2022:4140-1","SUSE-SU-2022:4141-1","SUSE-SU-2022:4142-1","SUSE-SU-2022:4143-1","SUSE-SU-2022:4144-1","SUSE-SU-2022:4218-1","SUSE-SU-2022:4219-1","SUSE-SU-2022:4302-1","SUSE-SU-2023:1701-1","openSUSE-SU-2024:12517-1"],"references":[{"type":"WEB","url":"https://arstechnica.com/security/2024/08/a-patch-microsoft-spent-2-years-preparing-is-making-a-mess-for-some-linux-users/"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202311-14"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20230203-0004/"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2112975#c0"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-2601.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"2.06"}]},{"events":[{"introduced":"0"},{"last_affected":"37"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"0"},{"last_affected":"8.2"}]},{"events":[{"introduced":"0"},{"last_affected":"8.1"}]},{"events":[{"introduced":"0"},{"last_affected":"8.2"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]},{"events":[{"introduced":"0"},{"last_affected":"8.2"}]},{"events":[{"introduced":"0"},{"last_affected":"8.1"}]},{"events":[{"introduced":"0"},{"last_affected":"8.2"}]},{"events":[{"introduced":"0"},{"last_affected":"9.0"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H"}]}