Out-of-bounds Write Affecting grub2-x86_64-efi package, versions <2.04-150200.9.63.2
Snyk CVSS
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-SLES152-GRUB2X8664EFI-2870637
- published 15 Jun 2022
- disclosed 14 Jun 2022
Introduced: 14 Jun 2022
CVE-2021-3695 Open this link in a new tabHow to fix?
Upgrade SLES:15.2
grub2-x86_64-efi
to version 2.04-150200.9.63.2 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream grub2-x86_64-efi
package and not the grub2-x86_64-efi
package as distributed by SLES:15.2
.
See How to fix?
for SLES:15.2
relevant fixed versions and status.
A crafted 16-bit grayscale PNG image may lead to a out-of-bounds write in the heap area. An attacker may take advantage of that to cause heap data corruption or eventually arbitrary code execution and circumvent secure boot protections. This issue has a high complexity to be exploited as an attacker needs to perform some triage over the heap layout to achieve signifcant results, also the values written into the memory are repeated three times in a row making difficult to produce valid payloads. This flaw affects grub2 versions prior grub-2.12.
References
- CVE-2021-3695
- E-Mail link for SUSE-SU-2022:2074-1
- Link for SUSE-SU-2022:2074-1
- SUSE Bug 1191184
- SUSE Bug 1191185
- SUSE Bug 1191186
- SUSE Bug 1193282
- SUSE Bug 1197948
- SUSE Bug 1198460
- SUSE Bug 1198493
- SUSE Bug 1198495
- SUSE Bug 1198496
- SUSE Bug 1198581
- SUSE Bug 1201022
- SUSE Bug 1203445
- SUSE Bug 1205057
- SUSE CVE CVE-2021-3695 page
- SUSE CVE CVE-2021-3696 page
- SUSE CVE CVE-2021-3697 page
- SUSE CVE CVE-2022-28733 page
- SUSE CVE CVE-2022-28734 page
- SUSE CVE CVE-2022-28735 page
- SUSE CVE CVE-2022-28736 page
- SUSE Security Ratings
- secalert@redhat.com
- secalert@redhat.com
- secalert@redhat.com