DescriptionA flaw in grub2 was found where its configuration file, known as grub.cfg, is being created with the wrong permission set allowing non privileged users to read its content. This represents a low severity confidentiality issue, as those users can eventually read any encrypted passwords present in grub.cfg. This flaw affects grub2 2.06 and previous versions. This issue has been fixed in grub upstream but no version with the fix is currently released.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1001414

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
grub2 (PTS)buster2.06-3~deb10u1vulnerable
buster (security)2.06-3~deb10u4vulnerable
bullseye (security), bullseye2.06-3~deb11u6vulnerable
bookworm, bookworm (security)2.06-13+deb12u1fixed
sid, trixie2.12-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
grub2sourcestretch(not affected)


[bullseye] - grub2 <no-dsa> (Minor issue)
[buster] - grub2 <no-dsa> (Minor issue)
[stretch] - grub2 <not-affected> (Vulnerable code introduced later)
Introduced by:;a=commit;h=ab2e53c8a196a595e50f1c836bf756b9db1ae68d (grub-2.06-rc1)
Fixed by:;a=commit;h=0adec29674561034771c13e446069b41ef41e4d4

Search for package or bug name: Reporting problems