Search for packages
| purl | pkg:deb/debian/grub2@0?distro=trixie |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-4nrc-eeyb-uqaz | grub2: bypass the GRUB password protection feature |
CVE-2023-4001
|
| VCID-7m7x-bjrn-fkgg | grub2: grub2 allows bypassing TPM-bound disk encryption on SL(E)M encrypted Images |
CVE-2024-49504
|
| VCID-ctvs-7qdg-ebh3 | grub2: modules built in on EFI builds that allow loading arbitrary code, circumventing secure boot |
CVE-2015-5281
|
| VCID-gjnt-nd6z-v3hf | grub2: grub2-set-bootflag utility causes grubenv corruption rendering the system non-bootable |
CVE-2019-14865
|
| VCID-hn7g-vvzw-c7g5 | A Insecure Temporary File vulnerability in grub-once of grub2 in SUSE Linux Enterprise Server 15 SP4, openSUSE Factory allows local attackers to truncate arbitrary files. This issue affects: SUSE Linux Enterprise Server 15 SP4 grub2 versions prior to 2.06-150400.7.1. SUSE openSUSE Factory grub2 versions prior to 2.06-18.1. |
CVE-2021-46705
|
| VCID-kf2m-fx4q-wbhz | Multiple vulnerabilities have been found in GRUB, the worst might allow for circumvention of UEFI Secure Boot. |
CVE-2020-15705
|
| VCID-nu7m-84c3-uyfu | grub2: grub 2.05 reintroduced CVE-2020-15705 |
CVE-2021-3418
|
| VCID-nyx2-qahu-w7f1 | grub2: grub2-set-bootflag can be abused by local (pseudo-)users |
CVE-2024-1048
|
| VCID-psu8-3m29-7udp | grub2: grub-efi crashes upon `exit` |
CVE-2024-2312
|