First published: Mon Aug 09 2021(Updated: )
A heap out-of-bounds write may heppen during the handling of Huffman tables in the PNG reader. This may lead to data corruption in the heap space. Confidentiality, Integrity and Availablity impact may be considered Low as it's very complex to an attacker control the encoding and positioning of corrupted Huffman entries to achieve results such as arbitrary code execution and/or secure boot circumvention. This flaw affects grub2 versions prior grub-2.12.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/grub2 | 2.06-3~deb10u1 2.06-3~deb10u3 2.06-3~deb11u5 2.06-3~deb11u4 2.06-13 2.12~rc1-9 | |
redhat/grub2 | <1:2.02-123.el8_6.8 | 1:2.02-123.el8_6.8 |
redhat/grub2 | <1:2.02-87.el8_1.10 | 1:2.02-87.el8_1.10 |
redhat/grub2 | <1:2.02-87.el8_2.10 | 1:2.02-87.el8_2.10 |
redhat/grub2 | <1:2.02-99.el8_4.9 | 1:2.02-99.el8_4.9 |
redhat/grub2 | <1:2.06-27.el9_0.7 | 1:2.06-27.el9_0.7 |
redhat/grub | <2.12 | 2.12 |
Gnu Grub2 | >=2.00<2.12 | |
Redhat Developer Tools | =1.0 | |
Redhat Openshift | =3.0 | |
Red Hat Enterprise Linux | =8.0 | |
Red Hat Enterprise Linux | =8.1 | |
Red Hat Enterprise Linux | =8.4 | |
Red Hat Enterprise Linux | =9.0 | |
Redhat Enterprise Linux Eus | =8.2 | |
Redhat Enterprise Linux Eus | =8.4 | |
Redhat Enterprise Linux Eus | =8.6 | |
Redhat Enterprise Linux Eus | =9.0 | |
Redhat Enterprise Linux For Power Little Endian | =8.0 | |
Redhat Enterprise Linux For Power Little Endian | =9.0 | |
Redhat Enterprise Linux For Power Little Endian Eus | =8.2 | |
Redhat Enterprise Linux For Power Little Endian Eus | =8.4 | |
Redhat Enterprise Linux For Power Little Endian Eus | =8.6 | |
Redhat Enterprise Linux For Power Little Endian Eus | =9.0 | |
Red Hat Enterprise Linux Server | =8.2 | |
Red Hat Enterprise Linux Server | =8.4 | |
Red Hat Enterprise Linux Server | =8.6 | |
Redhat Enterprise Linux Server For Power Little Endian Update Services For Sap Solutions | =8.1 | |
Redhat Enterprise Linux Server For Power Little Endian Update Services For Sap Solutions | =8.2 | |
Redhat Enterprise Linux Server For Power Little Endian Update Services For Sap Solutions | =8.4 | |
Redhat Enterprise Linux Server For Power Little Endian Update Services For Sap Solutions | =8.6 | |
Redhat Enterprise Linux Server For Power Little Endian Update Services For Sap Solutions | =9.0 | |
Red Hat Enterprise Linux Server | =8.2 | |
Red Hat Enterprise Linux Server | =8.4 | |
Red Hat Enterprise Linux Server | =8.6 | |
Red Hat OpenShift Container Platform | =4.6 | |
Red Hat OpenShift Container Platform | =4.9 | |
Red Hat OpenShift Container Platform | =4.10 | |
Red Hat Enterprise Linux | =8.0 | |
Redhat Codeready Linux Builder | ||
Red Hat Enterprise Linux | =9.0 | |
Redhat Enterprise Linux Eus | =8.2 | |
Redhat Enterprise Linux Eus | =8.4 | |
Redhat Enterprise Linux Eus | =8.6 | |
Redhat Enterprise Linux Eus | =9.0 | |
NetApp ONTAP Select Deploy administration utility |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2021-3696 is a vulnerability found in grub2 when handling a PNG image header, which can lead to data corruption in the heap space.
The severity of CVE-2021-3696 is medium with a severity value of 5.
The affected software includes grub2 versions 1:2.02-123.el8_6.8, 1:2.02-87.el8_1, 1:2.02-87.el8_2, 1:2.02-99.el8_4.9, and 1:2.06-27.el9_0.7.
You can fix CVE-2021-3696 by applying the recommended patches provided by Redhat.
You can find more information about CVE-2021-3696 on the CVE website (https://www.cve.org/CVERecord?id=CVE-2021-3696) and NIST NVD (https://nvd.nist.gov/vuln/detail/CVE-2021-3696).