Risk | High |
Patch available | YES |
Number of vulnerabilities | 6 |
CVE-ID | CVE-2021-3695 CVE-2021-3696 CVE-2021-3697 CVE-2022-28733 CVE-2022-28734 CVE-2022-28736 |
CWE-ID | CWE-787 CWE-191 CWE-416 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
SUSE Linux Enterprise Server Operating systems & Components / Operating system grub2-systemd-sleep-plugin Operating systems & Components / Operating system package or component grub2-snapper-plugin Operating systems & Components / Operating system package or component grub2-x86_64-xen Operating systems & Components / Operating system package or component grub2-x86_64-efi Operating systems & Components / Operating system package or component grub2-i386-pc Operating systems & Components / Operating system package or component grub2-debugsource Operating systems & Components / Operating system package or component grub2-debuginfo Operating systems & Components / Operating system package or component grub2 Operating systems & Components / Operating system package or component |
Vendor | SUSE |
Security Bulletin
This security bulletin contains information about 6 vulnerabilities.
EUVDB-ID: #VU64057
Risk: Low
CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-3695
CWE-ID:
CWE-787 - Out-of-bounds write
Exploit availability: No
Description The vulnerability allows a local privileged user to bypass implemented security restrictions.
The vulnerability exists due to a boundary error when processing PNG grayscale images. A local privileged user can pass specially crafted PNG image to the application, trigger an out-of-bounds write error and potentially bypass secure boot protection mechanism.
Update the affected package grub2 to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server: 12-SP2-BCL
grub2-systemd-sleep-plugin: before 2.02-115.67.2
grub2-snapper-plugin: before 2.02-115.67.2
grub2-x86_64-xen: before 2.02-115.67.2
grub2-x86_64-efi: before 2.02-115.67.2
grub2-i386-pc: before 2.02-115.67.2
grub2-debugsource: before 2.02-115.67.2
grub2-debuginfo: before 2.02-115.67.2
grub2: before 2.02-115.67.2
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20222039-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU64059
Risk: Low
CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-3696
CWE-ID:
CWE-787 - Out-of-bounds write
Exploit availability: No
Description
The vulnerability allows a local privileged user to bypass implemented security restrictions.
The vulnerability exists due to a boundary error when handling Huffman tables in the PNG reader. A local privileged user can pass specially crafted PNG image to the application, trigger an out-of-bounds write error and potentially bypass secure boot protection mechanism.
Update the affected package grub2 to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server: 12-SP2-BCL
grub2-systemd-sleep-plugin: before 2.02-115.67.2
grub2-snapper-plugin: before 2.02-115.67.2
grub2-x86_64-xen: before 2.02-115.67.2
grub2-x86_64-efi: before 2.02-115.67.2
grub2-i386-pc: before 2.02-115.67.2
grub2-debugsource: before 2.02-115.67.2
grub2-debuginfo: before 2.02-115.67.2
grub2: before 2.02-115.67.2
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20222039-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU64061
Risk: Low
CVSSv4.0: 5.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-3697
CWE-ID:
CWE-191 - Integer underflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to integer underflow within the JPEG reader. A local privileged user can trigger an integer underflow and bypass secure boot protection mechanism.
MitigationUpdate the affected package grub2 to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server: 12-SP2-BCL
grub2-systemd-sleep-plugin: before 2.02-115.67.2
grub2-snapper-plugin: before 2.02-115.67.2
grub2-x86_64-xen: before 2.02-115.67.2
grub2-x86_64-efi: before 2.02-115.67.2
grub2-i386-pc: before 2.02-115.67.2
grub2-debugsource: before 2.02-115.67.2
grub2-debuginfo: before 2.02-115.67.2
grub2: before 2.02-115.67.2
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20222039-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU64062
Risk: High
CVSSv4.0: 7.2 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2022-28733
CWE-ID:
CWE-191 - Integer underflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to integer underflow when processing IP packets within the grub_net_recv_ip4_packets() function. A remote attacker can send specially crafted network traffic to the affected system, trigger an integer underflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationUpdate the affected package grub2 to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server: 12-SP2-BCL
grub2-systemd-sleep-plugin: before 2.02-115.67.2
grub2-snapper-plugin: before 2.02-115.67.2
grub2-x86_64-xen: before 2.02-115.67.2
grub2-x86_64-efi: before 2.02-115.67.2
grub2-i386-pc: before 2.02-115.67.2
grub2-debugsource: before 2.02-115.67.2
grub2-debuginfo: before 2.02-115.67.2
grub2: before 2.02-115.67.2
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20222039-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU64063
Risk: Medium
CVSSv4.0: 4.9 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2022-28734
CWE-ID:
CWE-787 - Out-of-bounds write
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a boundary error when processing split HTTP headerst. A remote attacker can send specially crafted traffic to the affected system, trigger an out-of-bounds write and execute arbitrary code on the target system.
MitigationUpdate the affected package grub2 to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server: 12-SP2-BCL
grub2-systemd-sleep-plugin: before 2.02-115.67.2
grub2-snapper-plugin: before 2.02-115.67.2
grub2-x86_64-xen: before 2.02-115.67.2
grub2-x86_64-efi: before 2.02-115.67.2
grub2-i386-pc: before 2.02-115.67.2
grub2-debugsource: before 2.02-115.67.2
grub2-debuginfo: before 2.02-115.67.2
grub2: before 2.02-115.67.2
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20222039-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU64065
Risk: Low
CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-28736
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to bypass implemented security restrictions.
The vulnerability exists due to a use-after-free error in the grub_cmd_chainloader() function in chainloader command. A local privileged user can trigger a use-after-free error and bypass secure boot protection mechanism.
MitigationUpdate the affected package grub2 to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server: 12-SP2-BCL
grub2-systemd-sleep-plugin: before 2.02-115.67.2
grub2-snapper-plugin: before 2.02-115.67.2
grub2-x86_64-xen: before 2.02-115.67.2
grub2-x86_64-efi: before 2.02-115.67.2
grub2-i386-pc: before 2.02-115.67.2
grub2-debugsource: before 2.02-115.67.2
grub2-debuginfo: before 2.02-115.67.2
grub2: before 2.02-115.67.2
CPE2.3https://www.suse.com/support/update/announcement/2022/suse-su-20222039-1/
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.