First published: Wed May 25 2022(Updated: )
Out-of-bounds write when handling split HTTP headers; When handling split HTTP headers, GRUB2 HTTP code accidentally moves its internal data buffer point by one position. This can lead to a out-of-bound write further when parsing the HTTP request, writing a NULL byte past the buffer. It's conceivable that an attacker controlled set of packets can lead to corruption of the GRUB2's internal memory metadata.
Credit: security@ubuntu.com security@ubuntu.com security@ubuntu.com
Affected Software | Affected Version | How to fix |
---|---|---|
ubuntu/grub2 | <2.06-3 | 2.06-3 |
debian/grub2 | 2.06-3~deb10u1 2.06-3~deb10u3 2.06-3~deb11u5 2.06-3~deb11u4 2.06-13 2.12~rc1-9 | |
redhat/grub2 | <1:2.02-123.el8_6.8 | 1:2.02-123.el8_6.8 |
redhat/grub2 | <1:2.02-87.el8_1.10 | 1:2.02-87.el8_1.10 |
redhat/grub2 | <1:2.02-87.el8_2.10 | 1:2.02-87.el8_2.10 |
redhat/grub2 | <1:2.02-99.el8_4.9 | 1:2.02-99.el8_4.9 |
redhat/grub2 | <1:2.06-27.el9_0.7 | 1:2.06-27.el9_0.7 |
Gnu Grub2 | >=2.00<2.06-3 | |
redhat/grub | <2.12 | 2.12 |
gnu Grub2 | >=2.00<2.06-3 | |
NetApp Active IQ Unified Manager for VMware vSphere |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2022-28734 is a vulnerability in grub2 that allows an attacker to perform an out-of-bounds write due to an issue handling split HTTP headers.
CVE-2022-28734 has a severity rating of 9.8 (Critical).
CVE-2022-28734 affects the following software versions: Red Hat grub2 1:2.02-123.el8_6.8, Red Hat grub2 1:2.02-87.el8_1.10, Red Hat grub2 1:2.02-87.el8_2.10, Red Hat grub2 1:2.02-99.el8_4.9, Red Hat grub2 1:2.06-27.el9_0.7, Red Hat grub 2.12, Gnu Grub2 2.00 to 2.06-3, Ubuntu grub2 2.06-3, Debian grub2 2.06-3~deb10u1, 2.06-3~deb10u3, 2.06-3~deb11u5, 2.06-3~deb11u4, 2.06-13, and 2.12~rc1-9.
An attacker can exploit CVE-2022-28734 by crafting a malicious request containing split HTTP headers that trigger an out-of-bounds write in grub2, potentially leading to remote code execution or denial of service.
To fix CVE-2022-28734, it is recommended to update the affected software versions to the specified remedies: Red Hat grub2 1:2.02-123.el8_6.8, Red Hat grub2 1:2.02-87.el8_1.10, Red Hat grub2 1:2.02-87.el8_2.10, Red Hat grub2 1:2.02-99.el8_4.9, Red Hat grub2 1:2.06-27.el9_0.7, Red Hat grub 2.12, Gnu Grub2 2.06-3, Ubuntu grub2 2.06-3, Debian grub2 2.06-3~deb10u1, 2.06-3~deb10u3, 2.06-3~deb11u5, 2.06-3~deb11u4, 2.06-13, and 2.12~rc1-9.