Risk | High |
Patch available | YES |
Number of vulnerabilities | 8 |
CVE-ID | CVE-2021-3695 CVE-2021-3696 CVE-2021-3697 CVE-2022-28733 CVE-2022-28734 CVE-2022-28735 CVE-2022-28736 CVE-2022-28737 |
CWE-ID | CWE-787 CWE-191 CWE-345 CWE-416 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
Anolis OS Operating systems & Components / Operating system shim-x64 Operating systems & Components / Operating system package or component shim-unsigned-x64 Operating systems & Components / Operating system package or component shim-ia32 Operating systems & Components / Operating system package or component shim-aa64 Operating systems & Components / Operating system package or component mokutil Operating systems & Components / Operating system package or component grub2-tools-efi Operating systems & Components / Operating system package or component grub2-pc Operating systems & Components / Operating system package or component grub2-efi-x64-cdboot Operating systems & Components / Operating system package or component grub2-efi-x64 Operating systems & Components / Operating system package or component grub2-efi-ia32-cdboot Operating systems & Components / Operating system package or component grub2-efi-ia32 Operating systems & Components / Operating system package or component grub2-tools-minimal Operating systems & Components / Operating system package or component grub2-tools-extra Operating systems & Components / Operating system package or component grub2-tools Operating systems & Components / Operating system package or component grub2-efi-aa64-cdboot Operating systems & Components / Operating system package or component grub2-efi-aa64 Operating systems & Components / Operating system package or component grub2-pc-modules Operating systems & Components / Operating system package or component grub2-efi-x64-modules Operating systems & Components / Operating system package or component grub2-efi-ia32-modules Operating systems & Components / Operating system package or component grub2-efi-aa64-modules Operating systems & Components / Operating system package or component grub2-common Operating systems & Components / Operating system package or component |
Vendor | OpenAnolis |
Security Bulletin
This security bulletin contains information about 8 vulnerabilities.
EUVDB-ID: #VU64057
Risk: Low
CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-3695
CWE-ID:
CWE-787 - Out-of-bounds write
Exploit availability: No
Description The vulnerability allows a local privileged user to bypass implemented security restrictions.
The vulnerability exists due to a boundary error when processing PNG grayscale images. A local privileged user can pass specially crafted PNG image to the application, trigger an out-of-bounds write error and potentially bypass secure boot protection mechanism.
Install updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
shim-x64: before 15.6-1.0.1
shim-unsigned-x64: before 15.6-1
shim-ia32: before 15.6-1.0.1
shim-aa64: before 15.6-1.0.1
mokutil: before 0.3.0-11.0.3
grub2-tools-efi: before 2.02-123.0.1
grub2-pc: before 2.02-123.0.1
grub2-efi-x64-cdboot: before 2.02-123.0.1
grub2-efi-x64: before 2.02-123.0.1
grub2-efi-ia32-cdboot: before 2.02-123.0.1
grub2-efi-ia32: before 2.02-123.0.1
grub2-tools-minimal: before 2.02-123.0.1
grub2-tools-extra: before 2.02-123.0.1
grub2-tools: before 2.02-123.0.1
grub2-efi-aa64-cdboot: before 2.02-123.0.1
grub2-efi-aa64: before 2.02-123.0.1
grub2-pc-modules: before 2.02-123.0.1
grub2-efi-x64-modules: before 2.02-123.0.1
grub2-efi-ia32-modules: before 2.02-123.0.1
grub2-efi-aa64-modules: before 2.02-123.0.1
grub2-common: before 2.02-123.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2022:0525
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU64059
Risk: Low
CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-3696
CWE-ID:
CWE-787 - Out-of-bounds write
Exploit availability: No
Description
The vulnerability allows a local privileged user to bypass implemented security restrictions.
The vulnerability exists due to a boundary error when handling Huffman tables in the PNG reader. A local privileged user can pass specially crafted PNG image to the application, trigger an out-of-bounds write error and potentially bypass secure boot protection mechanism.
Install updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
shim-x64: before 15.6-1.0.1
shim-unsigned-x64: before 15.6-1
shim-ia32: before 15.6-1.0.1
shim-aa64: before 15.6-1.0.1
mokutil: before 0.3.0-11.0.3
grub2-tools-efi: before 2.02-123.0.1
grub2-pc: before 2.02-123.0.1
grub2-efi-x64-cdboot: before 2.02-123.0.1
grub2-efi-x64: before 2.02-123.0.1
grub2-efi-ia32-cdboot: before 2.02-123.0.1
grub2-efi-ia32: before 2.02-123.0.1
grub2-tools-minimal: before 2.02-123.0.1
grub2-tools-extra: before 2.02-123.0.1
grub2-tools: before 2.02-123.0.1
grub2-efi-aa64-cdboot: before 2.02-123.0.1
grub2-efi-aa64: before 2.02-123.0.1
grub2-pc-modules: before 2.02-123.0.1
grub2-efi-x64-modules: before 2.02-123.0.1
grub2-efi-ia32-modules: before 2.02-123.0.1
grub2-efi-aa64-modules: before 2.02-123.0.1
grub2-common: before 2.02-123.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2022:0525
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU64061
Risk: Low
CVSSv4.0: 5.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2021-3697
CWE-ID:
CWE-191 - Integer underflow
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to integer underflow within the JPEG reader. A local privileged user can trigger an integer underflow and bypass secure boot protection mechanism.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
shim-x64: before 15.6-1.0.1
shim-unsigned-x64: before 15.6-1
shim-ia32: before 15.6-1.0.1
shim-aa64: before 15.6-1.0.1
mokutil: before 0.3.0-11.0.3
grub2-tools-efi: before 2.02-123.0.1
grub2-pc: before 2.02-123.0.1
grub2-efi-x64-cdboot: before 2.02-123.0.1
grub2-efi-x64: before 2.02-123.0.1
grub2-efi-ia32-cdboot: before 2.02-123.0.1
grub2-efi-ia32: before 2.02-123.0.1
grub2-tools-minimal: before 2.02-123.0.1
grub2-tools-extra: before 2.02-123.0.1
grub2-tools: before 2.02-123.0.1
grub2-efi-aa64-cdboot: before 2.02-123.0.1
grub2-efi-aa64: before 2.02-123.0.1
grub2-pc-modules: before 2.02-123.0.1
grub2-efi-x64-modules: before 2.02-123.0.1
grub2-efi-ia32-modules: before 2.02-123.0.1
grub2-efi-aa64-modules: before 2.02-123.0.1
grub2-common: before 2.02-123.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2022:0525
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU64062
Risk: High
CVSSv4.0: 7.2 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2022-28733
CWE-ID:
CWE-191 - Integer underflow
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to integer underflow when processing IP packets within the grub_net_recv_ip4_packets() function. A remote attacker can send specially crafted network traffic to the affected system, trigger an integer underflow and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
shim-x64: before 15.6-1.0.1
shim-unsigned-x64: before 15.6-1
shim-ia32: before 15.6-1.0.1
shim-aa64: before 15.6-1.0.1
mokutil: before 0.3.0-11.0.3
grub2-tools-efi: before 2.02-123.0.1
grub2-pc: before 2.02-123.0.1
grub2-efi-x64-cdboot: before 2.02-123.0.1
grub2-efi-x64: before 2.02-123.0.1
grub2-efi-ia32-cdboot: before 2.02-123.0.1
grub2-efi-ia32: before 2.02-123.0.1
grub2-tools-minimal: before 2.02-123.0.1
grub2-tools-extra: before 2.02-123.0.1
grub2-tools: before 2.02-123.0.1
grub2-efi-aa64-cdboot: before 2.02-123.0.1
grub2-efi-aa64: before 2.02-123.0.1
grub2-pc-modules: before 2.02-123.0.1
grub2-efi-x64-modules: before 2.02-123.0.1
grub2-efi-ia32-modules: before 2.02-123.0.1
grub2-efi-aa64-modules: before 2.02-123.0.1
grub2-common: before 2.02-123.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2022:0525
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU64063
Risk: Medium
CVSSv4.0: 4.9 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2022-28734
CWE-ID:
CWE-787 - Out-of-bounds write
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a boundary error when processing split HTTP headerst. A remote attacker can send specially crafted traffic to the affected system, trigger an out-of-bounds write and execute arbitrary code on the target system.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
shim-x64: before 15.6-1.0.1
shim-unsigned-x64: before 15.6-1
shim-ia32: before 15.6-1.0.1
shim-aa64: before 15.6-1.0.1
mokutil: before 0.3.0-11.0.3
grub2-tools-efi: before 2.02-123.0.1
grub2-pc: before 2.02-123.0.1
grub2-efi-x64-cdboot: before 2.02-123.0.1
grub2-efi-x64: before 2.02-123.0.1
grub2-efi-ia32-cdboot: before 2.02-123.0.1
grub2-efi-ia32: before 2.02-123.0.1
grub2-tools-minimal: before 2.02-123.0.1
grub2-tools-extra: before 2.02-123.0.1
grub2-tools: before 2.02-123.0.1
grub2-efi-aa64-cdboot: before 2.02-123.0.1
grub2-efi-aa64: before 2.02-123.0.1
grub2-pc-modules: before 2.02-123.0.1
grub2-efi-x64-modules: before 2.02-123.0.1
grub2-efi-ia32-modules: before 2.02-123.0.1
grub2-efi-aa64-modules: before 2.02-123.0.1
grub2-common: before 2.02-123.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2022:0525
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU64064
Risk: Low
CVSSv4.0: 5.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-28735
CWE-ID:
CWE-345 - Insufficient Verification of Data Authenticity
Exploit availability: No
DescriptionThe vulnerability allows a local user to bypass implemented security restrictions.
The vulnerability exists due to shim_lock verifier allows non-kernel files to be loaded on shim-powered secure boot systems. A local privileged user can load unverified modules into GRUB and bypass secure boot protection mechanism.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
shim-x64: before 15.6-1.0.1
shim-unsigned-x64: before 15.6-1
shim-ia32: before 15.6-1.0.1
shim-aa64: before 15.6-1.0.1
mokutil: before 0.3.0-11.0.3
grub2-tools-efi: before 2.02-123.0.1
grub2-pc: before 2.02-123.0.1
grub2-efi-x64-cdboot: before 2.02-123.0.1
grub2-efi-x64: before 2.02-123.0.1
grub2-efi-ia32-cdboot: before 2.02-123.0.1
grub2-efi-ia32: before 2.02-123.0.1
grub2-tools-minimal: before 2.02-123.0.1
grub2-tools-extra: before 2.02-123.0.1
grub2-tools: before 2.02-123.0.1
grub2-efi-aa64-cdboot: before 2.02-123.0.1
grub2-efi-aa64: before 2.02-123.0.1
grub2-pc-modules: before 2.02-123.0.1
grub2-efi-x64-modules: before 2.02-123.0.1
grub2-efi-ia32-modules: before 2.02-123.0.1
grub2-efi-aa64-modules: before 2.02-123.0.1
grub2-common: before 2.02-123.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2022:0525
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU64065
Risk: Low
CVSSv4.0: 4 [CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-28736
CWE-ID:
CWE-416 - Use After Free
Exploit availability: No
DescriptionThe vulnerability allows a local user to bypass implemented security restrictions.
The vulnerability exists due to a use-after-free error in the grub_cmd_chainloader() function in chainloader command. A local privileged user can trigger a use-after-free error and bypass secure boot protection mechanism.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
shim-x64: before 15.6-1.0.1
shim-unsigned-x64: before 15.6-1
shim-ia32: before 15.6-1.0.1
shim-aa64: before 15.6-1.0.1
mokutil: before 0.3.0-11.0.3
grub2-tools-efi: before 2.02-123.0.1
grub2-pc: before 2.02-123.0.1
grub2-efi-x64-cdboot: before 2.02-123.0.1
grub2-efi-x64: before 2.02-123.0.1
grub2-efi-ia32-cdboot: before 2.02-123.0.1
grub2-efi-ia32: before 2.02-123.0.1
grub2-tools-minimal: before 2.02-123.0.1
grub2-tools-extra: before 2.02-123.0.1
grub2-tools: before 2.02-123.0.1
grub2-efi-aa64-cdboot: before 2.02-123.0.1
grub2-efi-aa64: before 2.02-123.0.1
grub2-pc-modules: before 2.02-123.0.1
grub2-efi-x64-modules: before 2.02-123.0.1
grub2-efi-ia32-modules: before 2.02-123.0.1
grub2-efi-aa64-modules: before 2.02-123.0.1
grub2-common: before 2.02-123.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2022:0525
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU64067
Risk: Low
CVSSv4.0: 5.7 [CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-28737
CWE-ID:
CWE-787 - Out-of-bounds write
Exploit availability: No
Description The vulnerability allows a local user to bypass implemented security restrictions.
The vulnerability exists due to a boundary error in the handle_image() function when shim tries to load and execute crafted EFI executables. A local privileged user can trigger an out-of-bounds write error and bypass secure boot protection mechanism.
MitigationInstall updates from vendor's repository.
Vulnerable software versionsAnolis OS: 8
shim-x64: before 15.6-1.0.1
shim-unsigned-x64: before 15.6-1
shim-ia32: before 15.6-1.0.1
shim-aa64: before 15.6-1.0.1
mokutil: before 0.3.0-11.0.3
grub2-tools-efi: before 2.02-123.0.1
grub2-pc: before 2.02-123.0.1
grub2-efi-x64-cdboot: before 2.02-123.0.1
grub2-efi-x64: before 2.02-123.0.1
grub2-efi-ia32-cdboot: before 2.02-123.0.1
grub2-efi-ia32: before 2.02-123.0.1
grub2-tools-minimal: before 2.02-123.0.1
grub2-tools-extra: before 2.02-123.0.1
grub2-tools: before 2.02-123.0.1
grub2-efi-aa64-cdboot: before 2.02-123.0.1
grub2-efi-aa64: before 2.02-123.0.1
grub2-pc-modules: before 2.02-123.0.1
grub2-efi-x64-modules: before 2.02-123.0.1
grub2-efi-ia32-modules: before 2.02-123.0.1
grub2-efi-aa64-modules: before 2.02-123.0.1
grub2-common: before 2.02-123.0.1
CPE2.3https://anas.openanolis.cn/errata/detail/ANSA-2022:0525
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.