vulnerability
Oracle Linux: CVE-2022-28737: ELSA-2022-9595: grub2 security update (IMPORTANT) (Multiple Advisories)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
7 | (AV:L/AC:L/Au:S/C:C/I:C/A:C) | 2022-06-07 | 2022-06-08 | 2025-01-07 |
Severity
7
CVSS
(AV:L/AC:L/Au:S/C:C/I:C/A:C)
Published
2022-06-07
Added
2022-06-08
Modified
2025-01-07
Description
There's a possible overflow in handle_image() when shim tries to load and execute crafted EFI executables; The handle_image() function takes into account the SizeOfRawData field from each section to be loaded. An attacker can leverage this to perform out-of-bound writes into memory. Arbitrary code execution is not discarded in such scenario.
A flaw was found in shim during the handling of EFI executables. A crafted EFI image can lead to an overflow in shim. This flaw allows an attacker to perform an out-of-bounds write in memory. A successful attack can lead to data integrity, confidentiality issues, and arbitrary code execution.
A flaw was found in shim during the handling of EFI executables. A crafted EFI image can lead to an overflow in shim. This flaw allows an attacker to perform an out-of-bounds write in memory. A successful attack can lead to data integrity, confidentiality issues, and arbitrary code execution.
Solution(s)
oracle-linux-upgrade-grub2-commonoracle-linux-upgrade-grub2-efi-aa64oracle-linux-upgrade-grub2-efi-aa64-cdbootoracle-linux-upgrade-grub2-efi-aa64-modulesoracle-linux-upgrade-grub2-efi-ia32oracle-linux-upgrade-grub2-efi-ia32-cdbootoracle-linux-upgrade-grub2-efi-ia32-modulesoracle-linux-upgrade-grub2-efi-x64oracle-linux-upgrade-grub2-efi-x64-cdbootoracle-linux-upgrade-grub2-efi-x64-modulesoracle-linux-upgrade-grub2-pcoracle-linux-upgrade-grub2-pc-modulesoracle-linux-upgrade-grub2-toolsoracle-linux-upgrade-grub2-tools-efioracle-linux-upgrade-grub2-tools-extraoracle-linux-upgrade-grub2-tools-minimaloracle-linux-upgrade-mokutiloracle-linux-upgrade-shim-ia32oracle-linux-upgrade-shim-x64

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.