Integer underflow in grub_net_recv_ip4_packets; A malicious crafted IP packet can lead to an integer underflow in grub_net_recv_ip4_packets() function on rsm->total_len value. Under certain circumstances the total_len value may end up wrapping around to a small integer number which will be used in memory allocation. If the attack succeeds in such way, subsequent operations can write past the end of the buffer.
The product subtracts one value from another, such that the result is less than the minimum allowable integer value, which produces a value that is not equal to the correct result.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Grub2 | Gnu | 2.00 (including) | 2.06-3 (excluding) |
Red Hat Enterprise Linux 7 | RedHat | grub2-1:2.02-0.87.el7_9.11 | * |
Red Hat Enterprise Linux 8 | RedHat | grub2-1:2.02-123.el8_6.8 | * |
Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions | RedHat | grub2-1:2.02-87.el8_1.10 | * |
Red Hat Enterprise Linux 8.2 Extended Update Support | RedHat | grub2-1:2.02-87.el8_2.10 | * |
Red Hat Enterprise Linux 8.4 Extended Update Support | RedHat | grub2-1:2.02-99.el8_4.9 | * |
Red Hat Enterprise Linux 9 | RedHat | grub2-1:2.06-27.el9_0.7 | * |
Red Hat Virtualization 4 for Red Hat Enterprise Linux 8 | RedHat | redhat-virtualization-host-0:4.5.1-202207170705_8.6 | * |
Grub2 | Ubuntu | bionic | * |
Grub2 | Ubuntu | impish | * |
Grub2 | Ubuntu | upstream | * |
Grub2-signed | Ubuntu | bionic | * |
Grub2-signed | Ubuntu | esm-infra/xenial | * |
Grub2-signed | Ubuntu | focal | * |
Grub2-signed | Ubuntu | jammy | * |
Grub2-signed | Ubuntu | kinetic | * |
Grub2-signed | Ubuntu | trusty | * |
Grub2-signed | Ubuntu | xenial | * |
Grub2-unsigned | Ubuntu | bionic | * |
Grub2-unsigned | Ubuntu | esm-infra/xenial | * |
Grub2-unsigned | Ubuntu | focal | * |
Grub2-unsigned | Ubuntu | jammy | * |
Grub2-unsigned | Ubuntu | kinetic | * |
Grub2-unsigned | Ubuntu | trusty | * |
Grub2-unsigned | Ubuntu | xenial | * |