[Bugs] [Bug 13528] New: [CVE 21] grub2 2.06 CVEs found
bugzilla
bugzilla на rosalinux.ru
Ср Авг 23 23:19:49 MSK 2023
https://bugzilla.rosalinux.ru/show_bug.cgi?id=13528
Platform: 2021.1
Bug ID: 13528
Summary: [CVE 21] grub2 2.06 CVEs found
Classification: ROSA-based products
Product: ROSA Fresh
Version: All
Hardware: All
URL: CVE-2022-28733, CVE-2022-28734, CVE-2022-28735,
CVE-2022-28736,
OS: Linux
Status: CONFIRMED
Severity: normal
Priority: Normal
Component: System (kernel, glibc, systemd, bash, PAM...)
Assignee: bugs на lists.rosalinux.ru
Reporter: y.tumanov на rosalinux.ru
QA Contact: bugs на lists.rosalinux.ru
CC: e.kosachev на rosalinux.ru, s.matveev на rosalinux.ru,
y.tumanov на rosalinux.ru
Target Milestone: ---
Flags: secteam_verified?
Please patch CVEs for package grub2 version 2.06
INFO (CVEs are): grub2 2.06
cves found
CVE-2022-28733
Desc: Integer underflow in grub_net_recv_ip4_packets; A malicious crafted IP
packet can lead to an integer underflow in grub_net_recv_ip4_packets() function
on rsm->total_len value. Under certain circumstances the total_len value may
end up wrapping around to a small integer number which will be used in memory
allocation. If the attack succeeds in such way, subsequent operations can write
past the end of the buffer.
Link: https://nvd.nist.gov/vuln/detail/CVE-2022-28733
Severity: HIGH
CVE-2022-28734
Desc: Out-of-bounds write when handling split HTTP headers; When handling split
HTTP headers, GRUB2 HTTP code accidentally moves its internal data buffer point
by one position. This can lead to a out-of-bound write further when parsing the
HTTP request, writing a NULL byte past the buffer. It's conceivable that an
attacker controlled set of packets can lead to corruption of the GRUB2's
internal memory metadata.
Link: https://nvd.nist.gov/vuln/detail/CVE-2022-28734
Severity: CRITICAL
CVE-2022-28735
Desc: The GRUB2's shim_lock verifier allows non-kernel files to be loaded on
shim-powered secure boot systems. Allowing such files to be loaded may lead to
unverified code and modules to be loaded in GRUB2 breaking the secure boot
trust-chain.
Link: https://nvd.nist.gov/vuln/detail/CVE-2022-28735
Severity: HIGH
CVE-2022-28736
Desc: There's a use-after-free vulnerability in grub_cmd_chainloader()
function; The chainloader command is used to boot up operating systems that
doesn't support multiboot and do not have direct support from GRUB2. When
executing chainloader more than once a use-after-free vulnerability is
triggered. If an attacker can control the GRUB2's memory allocation pattern
sensitive data may be exposed and arbitrary code execution can be achieved.
Link: https://nvd.nist.gov/vuln/detail/CVE-2022-28736
Severity: HIGH
--
You are receiving this mail because:
You are the QA Contact for the bug.
You are the assignee for the bug.
----------- следущая часть -----------
Вложение в формате HTML было извлечено…
URL: <http://lists.rosalinux.ru/pipermail/bugs/attachments/20230823/ce447d5f/attachment-0001.html>
Подробная информация о списке рассылки Bugs