Heap-based Buffer Overflow Affecting grub2-efi-x64 package, versions <1:2.02-156.el8
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-CENTOS8-GRUB2EFIX64-5930491
- published 4 Oct 2023
- disclosed 3 Oct 2023
Introduced: 3 Oct 2023
CVE-2023-4692 Open this link in a new tabHow to fix?
Upgrade Centos:8 grub2-efi-x64 to version 1:2.02-156.el8 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream grub2-efi-x64 package and not the grub2-efi-x64 package as distributed by Centos.
See How to fix? for Centos:8 relevant fixed versions and status.
An out-of-bounds write flaw was found in grub2's NTFS filesystem driver. This issue may allow an attacker to present a specially crafted NTFS filesystem image, leading to grub's heap metadata corruption. In some circumstances, the attack may also corrupt the UEFI firmware heap metadata. As a result, arbitrary code execution and secure boot protection bypass may be achieved.
References
- https://access.redhat.com/security/cve/CVE-2023-4692
- https://bugzilla.redhat.com/show_bug.cgi?id=2236613
- https://dfir.ru/2023/10/03/cve-2023-4692-cve-2023-4693-vulnerabilities-in-the-grub-boot-manager/
- https://lists.gnu.org/archive/html/grub-devel/2023-10/msg00028.html
- https://seclists.org/oss-sec/2023/q4/37
- https://security.gentoo.org/glsa/202311-14
- https://security.netapp.com/advisory/ntap-20231208-0002/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OIRJ5UZRXX2KLR4IKBJEQUNGOCXMMDLY/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FUU42E7CPYLATXOYVYNW6YTXXULAOV6L/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PERFILCHFEUGG3OAMC6W55P6DDIBZK4Q/
- https://access.redhat.com/errata/RHSA-2024:3184