First published: Mon Aug 09 2021(Updated: )
A heap out-of-bounds write may heppen during the handling of Huffman tables in the PNG reader. This may lead to data corruption in the heap space. Confidentiality, Integrity and Availablity impact may be considered Low as it's very complex to an attacker control the encoding and positioning of corrupted Huffman entries to achieve results such as arbitrary code execution and/or secure boot circumvention. This flaw affects grub2 versions prior grub-2.12.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/grub2 | 2.06-3~deb10u1 2.06-3~deb10u3 2.06-3~deb11u5 2.06-3~deb11u4 2.06-13 2.12~rc1-9 | |
redhat/grub2 | <1:2.02-123.el8_6.8 | 1:2.02-123.el8_6.8 |
redhat/grub2 | <1:2.02-87.el8_1.10 | 1:2.02-87.el8_1.10 |
redhat/grub2 | <1:2.02-87.el8_2.10 | 1:2.02-87.el8_2.10 |
redhat/grub2 | <1:2.02-99.el8_4.9 | 1:2.02-99.el8_4.9 |
redhat/grub2 | <1:2.06-27.el9_0.7 | 1:2.06-27.el9_0.7 |
redhat/grub | <2.12 | 2.12 |
Gnu Grub2 | >=2.00<2.12 | |
Redhat Developer Tools | =1.0 | |
Redhat Openshift | =3.0 | |
Redhat Enterprise Linux | =8.0 | |
Redhat Enterprise Linux | =8.1 | |
Redhat Enterprise Linux | =8.4 | |
Redhat Enterprise Linux | =9.0 | |
Redhat Enterprise Linux Eus | =8.2 | |
Redhat Enterprise Linux Eus | =8.4 | |
Redhat Enterprise Linux Eus | =8.6 | |
Redhat Enterprise Linux Eus | =9.0 | |
Redhat Enterprise Linux For Power Little Endian | =8.0 | |
Redhat Enterprise Linux For Power Little Endian | =9.0 | |
Redhat Enterprise Linux For Power Little Endian Eus | =8.2 | |
Redhat Enterprise Linux For Power Little Endian Eus | =8.4 | |
Redhat Enterprise Linux For Power Little Endian Eus | =8.6 | |
Redhat Enterprise Linux For Power Little Endian Eus | =9.0 | |
Redhat Enterprise Linux Server Aus | =8.2 | |
Redhat Enterprise Linux Server Aus | =8.4 | |
Redhat Enterprise Linux Server Aus | =8.6 | |
Redhat Enterprise Linux Server For Power Little Endian Update Services For Sap Solutions | =8.1 | |
Redhat Enterprise Linux Server For Power Little Endian Update Services For Sap Solutions | =8.2 | |
Redhat Enterprise Linux Server For Power Little Endian Update Services For Sap Solutions | =8.4 | |
Redhat Enterprise Linux Server For Power Little Endian Update Services For Sap Solutions | =8.6 | |
Redhat Enterprise Linux Server For Power Little Endian Update Services For Sap Solutions | =9.0 | |
Redhat Enterprise Linux Server Tus | =8.2 | |
Redhat Enterprise Linux Server Tus | =8.4 | |
Redhat Enterprise Linux Server Tus | =8.6 | |
Redhat Openshift Container Platform | =4.6 | |
Redhat Openshift Container Platform | =4.9 | |
Redhat Openshift Container Platform | =4.10 | |
Redhat Enterprise Linux | =8.0 | |
Redhat Codeready Linux Builder | ||
Redhat Enterprise Linux | =9.0 | |
Redhat Enterprise Linux Eus | =8.2 | |
Redhat Enterprise Linux Eus | =8.4 | |
Redhat Enterprise Linux Eus | =8.6 | |
Redhat Enterprise Linux Eus | =9.0 | |
NetApp ONTAP Select Deploy administration utility |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2021-3696 is a vulnerability found in grub2 when handling a PNG image header, which can lead to data corruption in the heap space.
The severity of CVE-2021-3696 is medium with a severity value of 5.
The affected software includes grub2 versions 1:2.02-123.el8_6.8, 1:2.02-87.el8_1, 1:2.02-87.el8_2, 1:2.02-99.el8_4.9, and 1:2.06-27.el9_0.7.
You can fix CVE-2021-3696 by applying the recommended patches provided by Redhat.
You can find more information about CVE-2021-3696 on the CVE website (https://www.cve.org/CVERecord?id=CVE-2021-3696) and NIST NVD (https://nvd.nist.gov/vuln/detail/CVE-2021-3696).