First published: Wed Nov 17 2021(Updated: )
A flaw in grub2 was found where its configuration file, known as grub.cfg, is being created with the wrong permission set allowing non privileged users to read its content. This represents a low severity confidentiality issue, as those users can eventually read any encrypted passwords present in grub.cfg. This flaw affects grub2 2.06 and previous versions. This issue has been fixed in grub upstream but no version with the fix is currently released.
Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
<=2.06 | ||
=34 | ||
Gnu Grub2 | <=2.06 | |
Fedoraproject Fedora | =34 | |
debian/grub2 | <=2.06-3~deb10u1<=2.06-3~deb10u3<=2.06-3~deb11u5<=2.06-3~deb11u4 | 2.06-13 2.12~rc1-9 |
https://git.savannah.gnu.org/gitweb/?p=grub.git;a=commit;h=0adec29674561034771c13e446069b41ef41e4d4
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-3981 is a vulnerability in grub2 where its configuration file (grub.cfg) is created with the wrong permissions, allowing non-privileged users to read its content.
CVE-2021-3981 has a low severity rating.
Non-privileged users can exploit CVE-2021-3981 by reading the content of the grub.cfg file, which may contain encrypted passwords.
To fix CVE-2021-3981, update the grub2 package to version 2.06-13 or 2.12~rc1-9, as recommended by Debian.
You can find more information about CVE-2021-3981 on the MITRE CVE website, the Red Hat security website, and the NIST National Vulnerability Database.