vulnerability
CentOS Linux: CVE-2022-28734: Important: grub2, mokutil, shim, and shim-unsigned-x64 security update (Multiple Advisories)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
8 | (AV:N/AC:M/Au:N/C:P/I:P/A:C) | 2022-06-16 | 2022-06-17 | 2025-01-28 |
Severity
8
CVSS
(AV:N/AC:M/Au:N/C:P/I:P/A:C)
Published
2022-06-16
Added
2022-06-17
Modified
2025-01-28
Description
Out-of-bounds write when handling split HTTP headers; When handling split HTTP headers, GRUB2 HTTP code accidentally moves its internal data buffer point by one position. This can lead to a out-of-bound write further when parsing the HTTP request, writing a NULL byte past the buffer. It's conceivable that an attacker controlled set of packets can lead to corruption of the GRUB2's internal memory metadata.
Solution(s)
centos-upgrade-grub2-commoncentos-upgrade-grub2-debuginfocentos-upgrade-grub2-debugsourcecentos-upgrade-grub2-efi-aa64-modulescentos-upgrade-grub2-efi-ia32centos-upgrade-grub2-efi-ia32-cdbootcentos-upgrade-grub2-efi-ia32-modulescentos-upgrade-grub2-efi-x64centos-upgrade-grub2-efi-x64-cdbootcentos-upgrade-grub2-efi-x64-modulescentos-upgrade-grub2-emu-debuginfocentos-upgrade-grub2-pccentos-upgrade-grub2-pc-modulescentos-upgrade-grub2-ppc64le-modulescentos-upgrade-grub2-toolscentos-upgrade-grub2-tools-debuginfocentos-upgrade-grub2-tools-eficentos-upgrade-grub2-tools-efi-debuginfocentos-upgrade-grub2-tools-extracentos-upgrade-grub2-tools-extra-debuginfocentos-upgrade-grub2-tools-minimalcentos-upgrade-grub2-tools-minimal-debuginfocentos-upgrade-mokutilcentos-upgrade-mokutil-debuginfocentos-upgrade-mokutil-debugsourcecentos-upgrade-shim-ia32centos-upgrade-shim-x64
References

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.