vulnerability

Microsoft Windows: CVE-2022-2601: Redhat: CVE-2022-2601 grub2 - Buffer overflow in grub_font_construct_glyph() can lead to out-of-bound write and possible secure boot bypass

Severity
7
CVSS
(AV:L/AC:M/Au:N/C:C/I:C/A:C)
Published
Aug 13, 2024
Added
Aug 13, 2024
Modified
Sep 10, 2025

Description

Microsoft Windows: CVE-2022-2601: Redhat: CVE-2022-2601 grub2 - Buffer overflow in grub_font_construct_glyph() can lead to out-of-bound write and possible secure boot bypass

Solutions

microsoft-windows-windows_10-1507-kb5041782microsoft-windows-windows_10-1507-kb5055547microsoft-windows-windows_10-1607-kb5041773microsoft-windows-windows_10-1607-kb5055521microsoft-windows-windows_10-1809-kb5041578microsoft-windows-windows_10-1809-kb5055519microsoft-windows-windows_10-21h2-kb5041580microsoft-windows-windows_10-22h2-kb5041580microsoft-windows-windows_11-21h2-kb5041592microsoft-windows-windows_11-22h2-kb5041585microsoft-windows-windows_11-22h2-kb5055528microsoft-windows-windows_11-23h2-kb5041585microsoft-windows-windows_11-23h2-kb5055528microsoft-windows-windows_11-24h2-kb5041571microsoft-windows-windows_11-24h2-kb5055523microsoft-windows-windows_server_2012-kb5041851microsoft-windows-windows_server_2012-kb5055581microsoft-windows-windows_server_2012_r2-kb5041828microsoft-windows-windows_server_2012_r2-kb5055557microsoft-windows-windows_server_2016-1607-kb5041773microsoft-windows-windows_server_2016-1607-kb5055521microsoft-windows-windows_server_2019-1809-kb5041578microsoft-windows-windows_server_2019-1809-kb5055519microsoft-windows-windows_server_2022-21h2-kb5041160microsoft-windows-windows_server_2022-21h2-kb5055526microsoft-windows-windows_server_2022-22h2-kb5041160microsoft-windows-windows_server_2022-22h2-kb5055526microsoft-windows-windows_server_2022-23h2-kb5041573microsoft-windows-windows_server_2022-23h2-kb5055527

References

    Title
    NEW

    Explore Exposure Command

    Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.