First published: Mon Aug 09 2021(Updated: )
A heap out-of-bounds write may heppen during the handling of Huffman tables in the PNG reader. This may lead to data corruption in the heap space. Confidentiality, Integrity and Availablity impact may be considered Low as it's very complex to an attacker control the encoding and positioning of corrupted Huffman entries to achieve results such as arbitrary code execution and/or secure boot circumvention. This flaw affects grub2 versions prior grub-2.12.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/grub2 | 2.06-3~deb10u1 2.06-3~deb10u3 2.06-3~deb11u5 2.06-3~deb11u4 2.06-13 2.12~rc1-9 | |
redhat/grub2 | <1:2.02-123.el8_6.8 | 1:2.02-123.el8_6.8 |
redhat/grub2 | <1:2.02-87.el8_1.10 | 1:2.02-87.el8_1.10 |
redhat/grub2 | <1:2.02-87.el8_2.10 | 1:2.02-87.el8_2.10 |
redhat/grub2 | <1:2.02-99.el8_4.9 | 1:2.02-99.el8_4.9 |
redhat/grub2 | <1:2.06-27.el9_0.7 | 1:2.06-27.el9_0.7 |
redhat/grub | <2.12 | 2.12 |
CentOS Grub2-pc-modules | >=2.00<2.12 | |
Red Hat Developer Tools | =1.0 | |
Red Hat OpenShift | =3.0 | |
Red Hat Enterprise Linux | =8.0 | |
Red Hat Enterprise Linux | =8.1 | |
Red Hat Enterprise Linux | =8.4 | |
Red Hat Enterprise Linux | =9.0 | |
Red Hat Enterprise Linux Server EUS | =8.2 | |
Red Hat Enterprise Linux Server EUS | =8.4 | |
Red Hat Enterprise Linux Server EUS | =8.6 | |
Red Hat Enterprise Linux Server EUS | =9.0 | |
Red Hat Enterprise Linux for Power, little endian | =8.0 | |
Red Hat Enterprise Linux for Power, little endian | =9.0 | |
Red Hat Enterprise Linux for Power, little endian - Extended Update Support | =8.2 | |
Red Hat Enterprise Linux for Power, little endian - Extended Update Support | =8.4 | |
Red Hat Enterprise Linux for Power, little endian - Extended Update Support | =8.6 | |
Red Hat Enterprise Linux for Power, little endian - Extended Update Support | =9.0 | |
Red Hat Enterprise Linux Server | =8.2 | |
Red Hat Enterprise Linux Server | =8.4 | |
Red Hat Enterprise Linux Server | =8.6 | |
Red Hat Enterprise Linux for SAP Applications for Power, little endian - Extended Update Support | =8.1 | |
Red Hat Enterprise Linux for SAP Applications for Power, little endian - Extended Update Support | =8.2 | |
Red Hat Enterprise Linux for SAP Applications for Power, little endian - Extended Update Support | =8.4 | |
Red Hat Enterprise Linux for SAP Applications for Power, little endian - Extended Update Support | =8.6 | |
Red Hat Enterprise Linux for SAP Applications for Power, little endian - Extended Update Support | =9.0 | |
Red Hat Enterprise Linux Server | =8.2 | |
Red Hat Enterprise Linux Server | =8.4 | |
Red Hat Enterprise Linux Server | =8.6 | |
Red Hat OpenShift Container Platform | =4.6 | |
Red Hat OpenShift Container Platform | =4.9 | |
Red Hat OpenShift Container Platform | =4.10 | |
Red Hat Enterprise Linux | =8.0 | |
Red Hat CodeReady Linux Builder | ||
Red Hat Enterprise Linux | =9.0 | |
Red Hat Enterprise Linux Server EUS | =8.2 | |
Red Hat Enterprise Linux Server EUS | =8.4 | |
Red Hat Enterprise Linux Server EUS | =8.6 | |
Red Hat Enterprise Linux Server EUS | =9.0 | |
NetApp ONTAP Select Deploy |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2021-3696 is a vulnerability found in grub2 when handling a PNG image header, which can lead to data corruption in the heap space.
The severity of CVE-2021-3696 is medium with a severity value of 5.
The affected software includes grub2 versions 1:2.02-123.el8_6.8, 1:2.02-87.el8_1, 1:2.02-87.el8_2, 1:2.02-99.el8_4.9, and 1:2.06-27.el9_0.7.
You can fix CVE-2021-3696 by applying the recommended patches provided by Redhat.
You can find more information about CVE-2021-3696 on the CVE website (https://www.cve.org/CVERecord?id=CVE-2021-3696) and NIST NVD (https://nvd.nist.gov/vuln/detail/CVE-2021-3696).