First published: Mon May 09 2022(Updated: )
Integer underflow in grub_net_recv_ip4_packets; A malicious crafted IP packet can lead to an integer underflow in grub_net_recv_ip4_packets() function on rsm->total_len value. Under certain circumstances the total_len value may end up wrapping around to a small integer number which will be used in memory allocation. If the attack succeeds in such way, subsequent operations can write past the end of the buffer.
Credit: security@ubuntu.com security@ubuntu.com security@ubuntu.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/grub2 | <1:2.02-0.87.el7_9.11 | 1:2.02-0.87.el7_9.11 |
redhat/grub2 | <1:2.02-123.el8_6.8 | 1:2.02-123.el8_6.8 |
redhat/grub2 | <1:2.02-87.el8_1.10 | 1:2.02-87.el8_1.10 |
redhat/grub2 | <1:2.02-87.el8_2.10 | 1:2.02-87.el8_2.10 |
redhat/grub2 | <1:2.02-99.el8_4.9 | 1:2.02-99.el8_4.9 |
redhat/grub2 | <1:2.06-27.el9_0.7 | 1:2.06-27.el9_0.7 |
ubuntu/grub2 | <2.06-3 | 2.06-3 |
Gnu Grub2 | >=2.00<2.06-3 | |
debian/grub2 | 2.06-3~deb10u1 2.06-3~deb10u3 2.06-3~deb11u5 2.06-3~deb11u4 2.06-13 2.12~rc1-9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
The vulnerability ID of this flaw is CVE-2022-28733.
This vulnerability affects the affected software by allowing an attacker to craft a malicious packet that triggers an integer underflow in the grub code.
The severity of CVE-2022-28733 is high with a CVSSv3 score of 8.1.
The recommended remedy for this vulnerability is to update the affected software to version 1:2.02-0.87.el7_9.11 for Red Hat, 1:2.02-123.el8_6.8 for Red Hat, and 1:2.02-87.el8_1.10 for Red Hat, among others.
You can find more information about CVE-2022-28733 on the MITRE CVE website, the NVD website, and the Openwall mailing list.