Out-of-bounds Write Affecting grub2-powerpc-ieee1275 package, versions <2.04-150200.9.63.2



    Attack Complexity High
    Privileges Required High
    Scope Changed
    Confidentiality High
    Integrity High
    Availability High
Expand this section
4.5 medium
Expand this section
7.5 high
Expand this section
Red Hat
7.5 high

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-SLES152-GRUB2POWERPCIEEE1275-2870695
  • published 15 Jun 2022
  • disclosed 14 Jun 2022

How to fix?

Upgrade SLES:15.2 grub2-powerpc-ieee1275 to version 2.04-150200.9.63.2 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream grub2-powerpc-ieee1275 package and not the grub2-powerpc-ieee1275 package as distributed by SLES:15.2. See How to fix? for SLES:15.2 relevant fixed versions and status.

A crafted 16-bit grayscale PNG image may lead to a out-of-bounds write in the heap area. An attacker may take advantage of that to cause heap data corruption or eventually arbitrary code execution and circumvent secure boot protections. This issue has a high complexity to be exploited as an attacker needs to perform some triage over the heap layout to achieve signifcant results, also the values written into the memory are repeated three times in a row making difficult to produce valid payloads. This flaw affects grub2 versions prior grub-2.12.