Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2022-28734

Published: 20 July 2023

Out-of-bounds write when handling split HTTP headers; When handling split HTTP headers, GRUB2 HTTP code accidentally moves its internal data buffer point by one position. This can lead to a out-of-bound write further when parsing the HTTP request, writing a NULL byte past the buffer. It's conceivable that an attacker controlled set of packets can lead to corruption of the GRUB2's internal memory metadata.

Priority

Medium

Cvss 3 Severity Score

8.1

Score breakdown

Status

Package Release Status
grub2-unsigned
Launchpad, Ubuntu, Debian
upstream Needs triage

trusty Does not exist

lunar Not vulnerable
(2.06-2ubuntu16)
xenial Needed

bionic
Released (2.06-2ubuntu14.1)
focal
Released (2.06-2ubuntu14.1)
kinetic Ignored
(end of life)
mantic Not vulnerable
(2.06-2ubuntu17)
jammy
Released (2.06-2ubuntu14.1)
grub2-signed
Launchpad, Ubuntu, Debian
trusty Needs triage

upstream Needs triage

kinetic Ignored
(end of life)
lunar Not vulnerable
(1.192)
xenial Needed

bionic
Released (1.187.3~18.04.1)
focal
Released (1.187.3~20.04.1)
jammy
Released (1.187.3~22.04.1)
mantic Not vulnerable
(1.193)
grub2
Launchpad, Ubuntu, Debian
lunar Not vulnerable
(does not affect Secure Boot)
impish Ignored
(end of life)
upstream
Released (2.06-3)
bionic Not vulnerable
(does not affect Secure Boot)
focal Not vulnerable
(does not affect Secure Boot)
jammy Not vulnerable
(does not affect Secure Boot)
kinetic Not vulnerable
(does not affect Secure Boot)
mantic Not vulnerable
(does not affect Secure Boot)

Severity score breakdown

Parameter Value
Base score 8.1
Attack vector Network
Attack complexity High
Privileges required None
User interaction None
Scope Unchanged
Confidentiality High
Integrity impact High
Availability impact High
Vector CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H