Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

grubgrub-2.12: 31 vulnerabilities (highest severity is: 8.6) #37

Open
mend-for-github-com bot opened this issue Jan 15, 2025 · 0 comments
Open

grubgrub-2.12: 31 vulnerabilities (highest severity is: 8.6) #37

mend-for-github-com bot opened this issue Jan 15, 2025 · 0 comments
Labels
Mend: dependency security vulnerability Security vulnerability detected by Mend

Comments

@mend-for-github-com
Copy link
Contributor

mend-for-github-com bot commented Jan 15, 2025

Vulnerable Library - grubgrub-2.12

Gnu Distributions

Library home page: https://ftp.gnu.org/gnu/grub?wsslib=grub

Found in HEAD commit: 34ea03480cbcacc530f29fed55eb2d7d0de23483

Vulnerable Source Files (1)

/grub-core/fs/ufs.c

Vulnerabilities

CVE Severity CVSS Dependency Type Fixed in (grubgrub version) Remediation Possible**
CVE-2022-2601 High 8.6 grubgrub-2.12 Direct N/A
CVE-2021-3345 High 7.8 grubgrub-2.12 Direct libgcrypt-1.9.1
CVE-2020-25647 High 7.6 grubgrub-2.12 Direct grub2-common - 2.02-0.86,2.02-90,2.02-0.86,2.02-87,2.02-0.87,2.02-87,2.02-0.86,2.02-0.86,2.02-0.86;grub2-tools-extra - 2.02-87,2.02-0.86,2.02-90,2.02-0.87,2.02-87,2.02-87,2.02-0.86,2.02-87,2.02-87,2.02-87,2.02-90,2.02-0.86,2.02-0.86,2.02-90;grub2-tools-extra-debuginfo - 2.02-90,2.02-87,2.02-87;grub2-pc-modules - 2.02-87,2.02-0.86,2.02-0.86,2.02-0.86,2.02-90,2.02-0.86,2.02-0.86,2.02-87,2.02-0.87;grub2-efi-x64-cdboot - 2.02-0.87,2.02-0.86,2.02-0.86,2.02-0.86,2.02-0.86,2.02-0.86,2.02-87,2.02-90,2.02-87;fwupd-debugsource - 1.1.4-9,1.1.4-4,1.5.9-1;grub2-tools - 2.02-0.86,2.02-90,2.02-90,2.02-87,2.02-87,2.02-0.86,2.02-0.87,2.02-0.86,2.02-0.86,2.02-87,2.02-87,2.02-87,2.02-0.87,2.02-0.86,2.02-90,2.02-87,2.02-0.86,2.02-0.86;grub2-tools-debuginfo - 2.02-87,2.02-87,2.02-90;grub2-efi-aa64 - 2.02-90,2.02-87,2.02-87;grub2-efi-ia32 - 2.02-0.86,2.02-87,2.02-0.86,2.02-87,2.02-0.86,2.02-90,2.02-0.86,2.02-0.87,2.02-0.86;grub2-tools-minimal - 2.02-87,2.02-0.86,2.02-87,2.02-0.86,2.02-87,2.02-0.86,2.02-87,2.02-87,2.02-90,2.02-90,2.02-0.86,2.02-0.87,2.02-0.86,2.02-90,2.02-87;grub2-efi-aa64-cdboot - 2.02-87,2.02-87,2.02-90;shim-x64 - 15.4-2;grub2-ppc64le-modules - 2.02-0.87,2.02-0.86,2.02-0.86,2.02-0.86,2.02-90,2.02-0.86,2.02-87,2.02-0.86,2.02-87;grub2-efi-ia32-cdboot - 2.02-87,2.02-90,2.02-0.86,2.02-0.87,2.02-0.86,2.02-87,2.02-0.86,2.02-0.86,2.02-0.86;grub2-ppc64le - 2.02-87,2.02-90,2.02-87;shim - 15.4-2;grub2-pc - 2.02-0.86,2.02-87,2.02-0.87,2.02-90,2.02-87,2.02-0.86,2.02-0.86,2.02-0.86,2.02-0.86;grub2-efi-x64 - 2.02-0.86,2.02-90,2.02-0.86,2.02-0.86,2.02-87,2.02-0.86,2.02-0.86,2.02-0.87,2.02-87;grub2-ppc-modules - 2.02-0.86,2.02-0.86,2.02-0.87,2.02-0.86,2.02-0.86,2.02-0.86;grub2-debugsource - 2.02-87,2.02-87,2.02-90;grub2-debuginfo - 2.02-0.86,2.02-0.86,2.02-0.86,2.02-0.86,2.02-0.87,2.02-0.86,2.02-87,2.02-87,2.02-90;shim-aa64 - 15.4-2;shim-ia32 - 15.4-2;grub2-efi-x64-modules - 2.02-0.86,2.02-90,2.02-0.86,2.02-87,2.02-0.86,2.02-0.86,2.02-0.86,2.02-87,2.02-0.87;grub2-tools-efi-debuginfo - 2.02-87,2.02-87,2.02-90;fwupd-debuginfo - 1.1.4-9,1.1.4-4,1.5.9-1;grub2-tools-efi - 2.02-87,2.02-90,2.02-87;fwupd - 1.5.9-1,1.1.4-4,1.1.4-4,1.1.4-4,1.1.4-9,1.5.9-1,1.5.9-1,1.5.9-1,1.1.4-9,1.1.4-9,1.1.4-4,1.1.4-4,1.5.9-1,1.1.4-9,1.1.4-9;grub2 - 2.02-0.87,2.02-0.87,2.02-0.86,2.02-0.86,2.02-0.86,2.02-0.86,2.02-0.86,2.02-0.86,2.02-0.86,2.02-0.86,2.02-0.86,2.02-87,2.02-0.86,2.02-87,2.02-0.86,2.02-0.87,2.02-0.86,2.02-90;grub2-efi-ia32-modules - 2.02-0.86,2.02-0.86,2.02-90,2.02-0.87,2.02-87,2.02-0.86,2.02-87,2.02-0.86,2.02-0.86;grub2-tools-minimal-debuginfo - 2.02-87,2.02-87,2.02-90;grub2-efi-aa64-modules - 2.02-0.86,2.02-0.87,2.02-0.86,2.02-87,2.02-0.86,2.02-0.86,2.02-0.86,2.02-87,2.02-90;grub2-tools-extra - 2.02-0.86
CVE-2023-4692 High 7.5 grubgrub-2.12 Direct 2.02;grub-2.02
CVE-2021-33560 High 7.5 grubgrub-2.12 Direct libgcrypt-1.9.3
CVE-2018-6829 High 7.5 grubgrub-2.12 Direct N/A
CVE-2017-0379 High 7.5 detected in multiple dependencies Direct libgcrypt - 1.8.5
CVE-2022-3775 High 7.1 grubgrub-2.12 Direct N/A
CVE-2021-3697 High 7.0 grubgrub-2.12 Direct N/A
CVE-2023-4001 Medium 6.8 detected in multiple dependencies Direct N/A
CVE-2017-7526 Medium 6.8 grubgrub-2.12 Direct libgcrypt - 1.8.5
CVE-2024-45781 Medium 6.7 grubgrub-2.12 Direct N/A
CVE-2024-45780 Medium 6.7 grubgrub-2.12 Direct N/A
CVE-2024-45774 Medium 6.7 grubgrub-2.12 Direct N/A
CVE-2025-0686 Medium 6.4 grubgrub-2.12 Direct N/A
CVE-2025-0685 Medium 6.4 grubgrub-2.12 Direct N/A
CVE-2025-0684 Medium 6.4 grubgrub-2.12 Direct N/A
CVE-2025-0677 Medium 6.4 grubgrub-2.12 Direct N/A
CVE-2020-15706 Medium 6.4 grubgrub-2.12 Direct grub - no_fix
CVE-2019-13627 Medium 6.3 detected in multiple dependencies Direct 1.8.5
CVE-2025-0690 Medium 6.1 grubgrub-2.12 Direct N/A
CVE-2024-45779 Medium 6.0 grubgrub-2.12 Direct N/A
CVE-2024-56738 Medium 5.3 grubgrub-2.12 Direct N/A
CVE-2023-4693 Medium 5.3 grubgrub-2.12 Direct N/A
CVE-2024-45775 Medium 5.2 grubgrub-2.12 Direct N/A
CVE-2021-3696 Medium 4.5 grubgrub-2.12 Direct N/A
CVE-2021-3695 Medium 4.5 grubgrub-2.12 Direct N/A
CVE-2025-1118 Medium 4.4 grubgrub-2.12 Direct N/A
CVE-2014-3591 Medium 4.2 grubgrub-2.12 Direct grub-efi - no_fix
CVE-2024-45778 Medium 4.1 grubgrub-2.12 Direct N/A
CVE-2015-7511 Low 2.0 grubgrub-2.12 Direct 1.6.5

**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation

Details

Partial details (24 vulnerabilities) are displayed below due to a content size limitation in GitHub. To view information on the remaining vulnerabilities, navigate to the Mend Application.

CVE-2022-2601

Vulnerable Library - grubgrub-2.12

Gnu Distributions

Library home page: https://ftp.gnu.org/gnu/grub?wsslib=grub

Found in HEAD commit: 34ea03480cbcacc530f29fed55eb2d7d0de23483

Found in base branch: develop

Vulnerable Source Files (1)

Vulnerability Details

A buffer overflow was found in grub_font_construct_glyph(). A malicious crafted pf2 font can lead to an overflow when calculating the max_glyph_size value, allocating a smaller than needed buffer for the glyph, this further leads to a buffer overflow and a heap based out-of-bounds write. An attacker may use this vulnerability to circumvent the secure boot mechanism.

Publish Date: 2022-12-14

URL: CVE-2022-2601

CVSS 3 Score Details (8.6)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Local
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: Required
    • Scope: Changed
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

CVE-2021-3345

Vulnerable Library - grubgrub-2.12

Gnu Distributions

Library home page: https://ftp.gnu.org/gnu/grub?wsslib=grub

Found in HEAD commit: 34ea03480cbcacc530f29fed55eb2d7d0de23483

Found in base branch: develop

Vulnerable Source Files (2)

/grub-core/lib/libgcrypt/cipher/hash-common.c
/grub-core/lib/libgcrypt/cipher/hash-common.c

Vulnerability Details

_gcry_md_block_write in cipher/hash-common.c in Libgcrypt version 1.9.0 has a heap-based buffer overflow when the digest final function sets a large count value. It is recommended to upgrade to 1.9.1 or later.

Publish Date: 2021-01-29

URL: CVE-2021-3345

CVSS 3 Score Details (7.8)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Local
    • Attack Complexity: Low
    • Privileges Required: Low
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3345

Release Date: 2021-01-29

Fix Resolution: libgcrypt-1.9.1

CVE-2020-25647

Vulnerable Library - grubgrub-2.12

Gnu Distributions

Library home page: https://ftp.gnu.org/gnu/grub?wsslib=grub

Found in HEAD commit: 34ea03480cbcacc530f29fed55eb2d7d0de23483

Found in base branch: develop

Vulnerable Source Files (3)

/grub-core/bus/usb/usb.c
/grub-core/bus/usb/usb.c
/grub-core/bus/usb/usb.c

Vulnerability Details

A flaw was found in grub2 in versions prior to 2.06. During USB device initialization, descriptors are read with very little bounds checking and assumes the USB device is providing sane values. If properly exploited, an attacker could trigger memory corruption leading to arbitrary code execution allowing a bypass of the Secure Boot mechanism. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

Publish Date: 2021-03-03

URL: CVE-2020-25647

CVSS 3 Score Details (7.6)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Physical
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Changed
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://nvd.nist.gov/vuln/detail/CVE-2020-25647

Release Date: 2021-03-03

Fix Resolution: grub2-common - 2.02-0.86,2.02-90,2.02-0.86,2.02-87,2.02-0.87,2.02-87,2.02-0.86,2.02-0.86,2.02-0.86;grub2-tools-extra - 2.02-87,2.02-0.86,2.02-90,2.02-0.87,2.02-87,2.02-87,2.02-0.86,2.02-87,2.02-87,2.02-87,2.02-90,2.02-0.86,2.02-0.86,2.02-90;grub2-tools-extra-debuginfo - 2.02-90,2.02-87,2.02-87;grub2-pc-modules - 2.02-87,2.02-0.86,2.02-0.86,2.02-0.86,2.02-90,2.02-0.86,2.02-0.86,2.02-87,2.02-0.87;grub2-efi-x64-cdboot - 2.02-0.87,2.02-0.86,2.02-0.86,2.02-0.86,2.02-0.86,2.02-0.86,2.02-87,2.02-90,2.02-87;fwupd-debugsource - 1.1.4-9,1.1.4-4,1.5.9-1;grub2-tools - 2.02-0.86,2.02-90,2.02-90,2.02-87,2.02-87,2.02-0.86,2.02-0.87,2.02-0.86,2.02-0.86,2.02-87,2.02-87,2.02-87,2.02-0.87,2.02-0.86,2.02-90,2.02-87,2.02-0.86,2.02-0.86;grub2-tools-debuginfo - 2.02-87,2.02-87,2.02-90;grub2-efi-aa64 - 2.02-90,2.02-87,2.02-87;grub2-efi-ia32 - 2.02-0.86,2.02-87,2.02-0.86,2.02-87,2.02-0.86,2.02-90,2.02-0.86,2.02-0.87,2.02-0.86;grub2-tools-minimal - 2.02-87,2.02-0.86,2.02-87,2.02-0.86,2.02-87,2.02-0.86,2.02-87,2.02-87,2.02-90,2.02-90,2.02-0.86,2.02-0.87,2.02-0.86,2.02-90,2.02-87;grub2-efi-aa64-cdboot - 2.02-87,2.02-87,2.02-90;shim-x64 - 15.4-2;grub2-ppc64le-modules - 2.02-0.87,2.02-0.86,2.02-0.86,2.02-0.86,2.02-90,2.02-0.86,2.02-87,2.02-0.86,2.02-87;grub2-efi-ia32-cdboot - 2.02-87,2.02-90,2.02-0.86,2.02-0.87,2.02-0.86,2.02-87,2.02-0.86,2.02-0.86,2.02-0.86;grub2-ppc64le - 2.02-87,2.02-90,2.02-87;shim - 15.4-2;grub2-pc - 2.02-0.86,2.02-87,2.02-0.87,2.02-90,2.02-87,2.02-0.86,2.02-0.86,2.02-0.86,2.02-0.86;grub2-efi-x64 - 2.02-0.86,2.02-90,2.02-0.86,2.02-0.86,2.02-87,2.02-0.86,2.02-0.86,2.02-0.87,2.02-87;grub2-ppc-modules - 2.02-0.86,2.02-0.86,2.02-0.87,2.02-0.86,2.02-0.86,2.02-0.86;grub2-debugsource - 2.02-87,2.02-87,2.02-90;grub2-debuginfo - 2.02-0.86,2.02-0.86,2.02-0.86,2.02-0.86,2.02-0.87,2.02-0.86,2.02-87,2.02-87,2.02-90;shim-aa64 - 15.4-2;shim-ia32 - 15.4-2;grub2-efi-x64-modules - 2.02-0.86,2.02-90,2.02-0.86,2.02-87,2.02-0.86,2.02-0.86,2.02-0.86,2.02-87,2.02-0.87;grub2-tools-efi-debuginfo - 2.02-87,2.02-87,2.02-90;fwupd-debuginfo - 1.1.4-9,1.1.4-4,1.5.9-1;grub2-tools-efi - 2.02-87,2.02-90,2.02-87;fwupd - 1.5.9-1,1.1.4-4,1.1.4-4,1.1.4-4,1.1.4-9,1.5.9-1,1.5.9-1,1.5.9-1,1.1.4-9,1.1.4-9,1.1.4-4,1.1.4-4,1.5.9-1,1.1.4-9,1.1.4-9;grub2 - 2.02-0.87,2.02-0.87,2.02-0.86,2.02-0.86,2.02-0.86,2.02-0.86,2.02-0.86,2.02-0.86,2.02-0.86,2.02-0.86,2.02-0.86,2.02-87,2.02-0.86,2.02-87,2.02-0.86,2.02-0.87,2.02-0.86,2.02-90;grub2-efi-ia32-modules - 2.02-0.86,2.02-0.86,2.02-90,2.02-0.87,2.02-87,2.02-0.86,2.02-87,2.02-0.86,2.02-0.86;grub2-tools-minimal-debuginfo - 2.02-87,2.02-87,2.02-90;grub2-efi-aa64-modules - 2.02-0.86,2.02-0.87,2.02-0.86,2.02-87,2.02-0.86,2.02-0.86,2.02-0.86,2.02-87,2.02-90;grub2-tools-extra - 2.02-0.86

CVE-2023-4692

Vulnerable Library - grubgrub-2.12

Gnu Distributions

Library home page: https://ftp.gnu.org/gnu/grub?wsslib=grub

Found in HEAD commit: 34ea03480cbcacc530f29fed55eb2d7d0de23483

Found in base branch: develop

Vulnerable Source Files (1)

/grub-core/fs/ntfs.c

Vulnerability Details

An out-of-bounds write flaw was found in grub2's NTFS filesystem driver. This issue may allow an attacker to present a specially crafted NTFS filesystem image, leading to grub's heap metadata corruption. In some circumstances, the attack may also corrupt the UEFI firmware heap metadata. As a result, arbitrary code execution and secure boot protection bypass may be achieved.

Publish Date: 2023-10-25

URL: CVE-2023-4692

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Local
    • Attack Complexity: High
    • Privileges Required: High
    • User Interaction: None
    • Scope: Changed
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://bugzilla.redhat.com/show_bug.cgi?id=2236613

Release Date: 2023-10-25

Fix Resolution: 2.02;grub-2.02

CVE-2021-33560

Vulnerable Library - grubgrub-2.12

Gnu Distributions

Library home page: https://ftp.gnu.org/gnu/grub?wsslib=grub

Found in HEAD commit: 34ea03480cbcacc530f29fed55eb2d7d0de23483

Found in base branch: develop

Vulnerable Source Files (3)

/grub-core/lib/libgcrypt/cipher/elgamal.c
/grub-core/lib/libgcrypt/cipher/elgamal.c
/grub-core/lib/libgcrypt/cipher/elgamal.c

Vulnerability Details

Libgcrypt before 1.8.8 and 1.9.x before 1.9.3 mishandles ElGamal encryption because it lacks exponent blinding to address a side-channel attack against mpi_powm, and the window size is not chosen appropriately. This, for example, affects use of ElGamal in OpenPGP.

Publish Date: 2021-06-08

URL: CVE-2021-33560

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: None
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33560

Release Date: 2021-06-08

Fix Resolution: libgcrypt-1.9.3

CVE-2018-6829

Vulnerable Library - grubgrub-2.12

Gnu Distributions

Library home page: https://ftp.gnu.org/gnu/grub?wsslib=grub

Found in HEAD commit: 34ea03480cbcacc530f29fed55eb2d7d0de23483

Found in base branch: develop

Vulnerable Source Files (3)

/grub-core/lib/libgcrypt/cipher/elgamal.c
/grub-core/lib/libgcrypt/cipher/elgamal.c
/grub-core/lib/libgcrypt/cipher/elgamal.c

Vulnerability Details

cipher/elgamal.c in Libgcrypt through 1.8.2, when used to encrypt messages directly, improperly encodes plaintexts, which allows attackers to obtain sensitive information by reading ciphertext data (i.e., it does not have semantic security in face of a ciphertext-only attack). The Decisional Diffie-Hellman (DDH) assumption does not hold for Libgcrypt's ElGamal implementation.
Mend Note: GnuPG uses ElGamal in hybrid mode only; This is not a vulnerability in libgcrypt, but in an application using it in an insecure manner.

Publish Date: 2018-02-07

URL: CVE-2018-6829

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: None
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

CVE-2017-0379

Vulnerable Libraries - grubgrub-2.12, grubgrub-2.12

grubgrub-2.12

Gnu Distributions

Library home page: https://ftp.gnu.org/gnu/grub?wsslib=grub

Vulnerable Source Files (3)

/grub-core/lib/libgcrypt/mpi/ec.c
/grub-core/lib/libgcrypt/cipher/ecc.c
/grub-core/lib/libgcrypt/mpi/ec.c

grubgrub-2.12

Gnu Distributions

Library home page: https://ftp.gnu.org/gnu/grub?wsslib=grub

Vulnerable Source Files (3)

/grub-core/lib/libgcrypt/mpi/ec.c
/grub-core/lib/libgcrypt/cipher/ecc.c
/grub-core/lib/libgcrypt/mpi/ec.c

Found in HEAD commit: 34ea03480cbcacc530f29fed55eb2d7d0de23483

Found in base branch: develop

Vulnerability Details

Libgcrypt before 1.8.1 does not properly consider Curve25519 side-channel attacks, which makes it easier for attackers to discover a secret key, related to cipher/ecc.c and mpi/ec.c.

Publish Date: 2017-08-29

URL: CVE-2017-0379

CVSS 3 Score Details (7.5)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: None
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://nvd.nist.gov/vuln/detail/CVE-2017-0379

Release Date: 2017-08-29

Fix Resolution: libgcrypt - 1.8.5

CVE-2022-3775

Vulnerable Library - grubgrub-2.12

Gnu Distributions

Library home page: https://ftp.gnu.org/gnu/grub?wsslib=grub

Found in HEAD commit: 34ea03480cbcacc530f29fed55eb2d7d0de23483

Found in base branch: develop

Vulnerable Source Files (1)

Vulnerability Details

When rendering certain unicode sequences, grub2's font code doesn't proper validate if the informed glyph's width and height is constrained within bitmap size. As consequence an attacker can craft an input which will lead to a out-of-bounds write into grub2's heap, leading to memory corruption and availability issues. Although complex, arbitrary code execution could not be discarded.

Publish Date: 2022-12-19

URL: CVE-2022-3775

CVSS 3 Score Details (7.1)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Local
    • Attack Complexity: Low
    • Privileges Required: Low
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: None
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

CVE-2021-3697

Vulnerable Library - grubgrub-2.12

Gnu Distributions

Library home page: https://ftp.gnu.org/gnu/grub?wsslib=grub

Found in HEAD commit: 34ea03480cbcacc530f29fed55eb2d7d0de23483

Found in base branch: develop

Vulnerable Source Files (1)

/grub-core/video/readers/jpeg.c

Vulnerability Details

A crafted JPEG image may lead the JPEG reader to underflow its data pointer, allowing user-controlled data to be written in heap. To a successful to be performed the attacker needs to perform some triage over the heap layout and craft an image with a malicious format and payload. This vulnerability can lead to data corruption and eventual code execution or secure boot circumvention. This flaw affects grub2 versions prior grub-2.12.

Publish Date: 2022-07-06

URL: CVE-2021-3697

CVSS 3 Score Details (7.0)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Local
    • Attack Complexity: High
    • Privileges Required: Low
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

CVE-2023-4001

Vulnerable Libraries - grubgrub-2.12, grubgrub-2.12

grubgrub-2.12

Gnu Distributions

Library home page: https://ftp.gnu.org/gnu/grub?wsslib=grub

Vulnerable Source Files (1)

/grub-core/commands/search.c

grubgrub-2.12

Gnu Distributions

Library home page: https://ftp.gnu.org/gnu/grub?wsslib=grub

Vulnerable Source Files (1)

/grub-core/commands/search.c

Found in HEAD commit: 34ea03480cbcacc530f29fed55eb2d7d0de23483

Found in base branch: develop

Vulnerability Details

An authentication bypass flaw was found in GRUB due to the way that GRUB uses the UUID of a device to search for the configuration file that contains the password hash for the GRUB password protection feature. An attacker capable of attaching an external drive such as a USB stick containing a file system with a duplicate UUID (the same as in the "/boot/" file system) can bypass the GRUB password protection feature on UEFI systems, which enumerate removable drives before non-removable ones. This issue was introduced in a downstream patch in Red Hat's version of grub2 and does not affect the upstream package.

Publish Date: 2024-01-15

URL: CVE-2023-4001

CVSS 3 Score Details (6.8)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Physical
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

CVE-2017-7526

Vulnerable Library - grubgrub-2.12

Gnu Distributions

Library home page: https://ftp.gnu.org/gnu/grub?wsslib=grub

Found in HEAD commit: 34ea03480cbcacc530f29fed55eb2d7d0de23483

Found in base branch: develop

Vulnerable Source Files (3)

/grub-core/lib/libgcrypt/cipher/rsa.c
/grub-core/lib/libgcrypt/cipher/rsa.c
/grub-core/lib/libgcrypt/cipher/rsa.c

Vulnerability Details

libgcrypt before version 1.7.8 is vulnerable to a cache side-channel attack resulting into a complete break of RSA-1024 while using the left-to-right method for computing the sliding-window expansion. The same attack is believed to work on RSA-2048 with moderately more computation. This side-channel requires that attacker can run arbitrary software on the hardware where the private RSA key is used.

Publish Date: 2018-07-26

URL: CVE-2017-7526

CVSS 3 Score Details (6.8)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: High
    • Privileges Required: None
    • User Interaction: None
    • Scope: Changed
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: None
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://nvd.nist.gov/vuln/detail/CVE-2017-7526

Release Date: 2018-07-26

Fix Resolution: libgcrypt - 1.8.5

CVE-2024-45781

Vulnerable Library - grubgrub-2.12

Gnu Distributions

Library home page: https://ftp.gnu.org/gnu/grub?wsslib=grub

Found in HEAD commit: 34ea03480cbcacc530f29fed55eb2d7d0de23483

Found in base branch: develop

Vulnerable Source Files (1)

/grub-core/fs/ufs.c

Vulnerability Details

A flaw was found in grub2. When reading a symbolic link's name from a UFS filesystem, grub2 fails to validate the string length taken as an input. The lack of validation may lead to a heap out-of-bounds write, causing data integrity issues and eventually allowing an attacker to circumvent secure boot protections.

Publish Date: 2025-02-18

URL: CVE-2024-45781

CVSS 3 Score Details (6.7)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Local
    • Attack Complexity: Low
    • Privileges Required: High
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

CVE-2024-45780

Vulnerable Library - grubgrub-2.12

Gnu Distributions

Library home page: https://ftp.gnu.org/gnu/grub?wsslib=grub

Found in HEAD commit: 34ea03480cbcacc530f29fed55eb2d7d0de23483

Found in base branch: develop

Vulnerable Source Files (1)

/grub-core/fs/tar.c

Vulnerability Details

A flaw was found in grub2. When reading tar files, grub2 allocates an internal buffer for the
file name however it fails to properly verify the allocation against
possible Integer Overflows. It's possible to cause the allocation
length to overflow with a crafted tar file leading to a head
Out-of-bounds write, as consequence an attacker may leverage this to
eventually circumvent secure boot protections.

Publish Date: 2025-03-03

URL: CVE-2024-45780

CVSS 3 Score Details (6.7)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Local
    • Attack Complexity: Low
    • Privileges Required: High
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

CVE-2024-45774

Vulnerable Library - grubgrub-2.12

Gnu Distributions

Library home page: https://ftp.gnu.org/gnu/grub?wsslib=grub

Found in HEAD commit: 34ea03480cbcacc530f29fed55eb2d7d0de23483

Found in base branch: develop

Vulnerable Source Files (1)

/grub-core/video/readers/jpeg.c

Vulnerability Details

A flaw was found in grub2. A specially crafted JPEG file can cause the JPEG parser of grub2 to incorrectly check the bounds of its internal buffers, resulting in an out-of-bounds write. The possibility of overwriting sensitive information to bypass secure boot protections is not discarded.

Publish Date: 2025-02-18

URL: CVE-2024-45774

CVSS 3 Score Details (6.7)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Local
    • Attack Complexity: Low
    • Privileges Required: High
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

CVE-2025-0686

Vulnerable Library - grubgrub-2.12

Gnu Distributions

Library home page: https://ftp.gnu.org/gnu/grub?wsslib=grub

Found in HEAD commit: 34ea03480cbcacc530f29fed55eb2d7d0de23483

Found in base branch: develop

Vulnerable Source Files (1)

/grub-core/fs/romfs.c

Vulnerability Details

A flaw was found in grub2. When performing a symlink lookup from a romfs filesystem, grub's romfs
filesystem module uses user-controlled parameters from the filesystem
geometry to determine the internal buffers size, however it misses to
properly check for integer overflows. A maliciouly crafted filesystem
may lead some of those buffer size calculation to overflow, causing it
to perform a grub_malloc() operation with a smaller size than
expected. As a result the grub_romfs_read_symlink() may cause a
out-of-bounds writes when calling grub_disk_read() function. This flaw
may be leveraged to corrupt grub's internal critical data and may
result in arbitrary code execution by-passing secure boot protections.

Publish Date: 2025-03-03

URL: CVE-2025-0686

CVSS 3 Score Details (6.4)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Local
    • Attack Complexity: High
    • Privileges Required: High
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

CVE-2025-0685

Vulnerable Library - grubgrub-2.12

Gnu Distributions

Library home page: https://ftp.gnu.org/gnu/grub?wsslib=grub

Found in HEAD commit: 34ea03480cbcacc530f29fed55eb2d7d0de23483

Found in base branch: develop

Vulnerable Source Files (1)

/grub-core/fs/jfs.c

Vulnerability Details

A flaw was found in grub2. When reading data from a jfs filesystem, grub's jfs filesystem module
uses user-controlled parameters from the filesystem geometry to
determine the internal buffers size, however it misses to properly
check for integer overflows. A maliciouly crafted filesystem may lead
some of those buffer size calculation to overflow, causing it to
perform a grub_malloc() operation with a smaller size than
expected. As a result the grub_jfs_lookup_symlink() function will
write past of the internal buffer length during
grub_jfs_read_file(). This flaw may be leveraged to corrupt grub's
internal critical data and may result in arbitrary code execution
by-passing secure boot protections.

Publish Date: 2025-03-03

URL: CVE-2025-0685

CVSS 3 Score Details (6.4)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Local
    • Attack Complexity: High
    • Privileges Required: High
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

CVE-2025-0684

Vulnerable Library - grubgrub-2.12

Gnu Distributions

Library home page: https://ftp.gnu.org/gnu/grub?wsslib=grub

Found in HEAD commit: 34ea03480cbcacc530f29fed55eb2d7d0de23483

Found in base branch: develop

Vulnerable Source Files (1)

/grub-core/fs/reiserfs.c

Vulnerability Details

A flaw was found in grub2. When performing a symlink lookup from a reiserfs filesystem, grub's
reiserfs fs module uses user-controlled parameters from the filesystem
geometry to determine the internal buffers size, however it misses to
properly check for integer overflows. A maliciouly crafted filesystem
may lead some of those buffer size calculation to overflow, causing it
to perform a grub_malloc() operation with a smaller size than
expected. As a result the grub_reiserfs_read_symlink() will call
grub_reiserfs_read_real() with a overflown length parameter leading to
a heap based out-of-bounds write during data reading. This flaw may be
leveraged to corrupt grub's internal critical data and may result in
arbitrary code execution by-passing secure boot protections.

Publish Date: 2025-03-03

URL: CVE-2025-0684

CVSS 3 Score Details (6.4)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Local
    • Attack Complexity: High
    • Privileges Required: High
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

CVE-2025-0677

Vulnerable Library - grubgrub-2.12

Gnu Distributions

Library home page: https://ftp.gnu.org/gnu/grub?wsslib=grub

Found in HEAD commit: 34ea03480cbcacc530f29fed55eb2d7d0de23483

Found in base branch: develop

Vulnerable Source Files (1)

/grub-core/fs/ufs.c

Vulnerability Details

A flaw was found in grub2. When performing a symlink lookup the grub's UFS module check the
inode's data size to allocate the internal buffer for reading the file
content however it misses to check if the symlink data size has
overflown. If that happens grub_malloc() may be called with a smaller
value than needed, as consequence when further reading the data from
disk into the buffer grub_ufs_lookup_symlink() function will write
past the end of the allocated size. An attack may leverage that by
crafting a malicious filesystem and as a result it will corrupt data
stored in the heap, it's possible that arbitrary code execution may be
achieved through it and to be used to by-pass secure boot mechanisms.

Publish Date: 2025-02-19

URL: CVE-2025-0677

CVSS 3 Score Details (6.4)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Local
    • Attack Complexity: High
    • Privileges Required: High
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

CVE-2020-15706

Vulnerable Library - grubgrub-2.12

Gnu Distributions

Library home page: https://ftp.gnu.org/gnu/grub?wsslib=grub

Found in HEAD commit: 34ea03480cbcacc530f29fed55eb2d7d0de23483

Found in base branch: develop

Vulnerable Source Files (1)

Vulnerability Details

GRUB2 contains a race condition in grub_script_function_create() leading to a use-after-free vulnerability which can be triggered by redefining a function whilst the same function is already executing, leading to arbitrary code execution and secure boot restriction bypass. This issue affects GRUB2 version 2.04 and prior versions.

Publish Date: 2020-07-29

URL: CVE-2020-15706

CVSS 3 Score Details (6.4)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Local
    • Attack Complexity: High
    • Privileges Required: High
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://nvd.nist.gov/vuln/detail/CVE-2020-15706

Release Date: 2020-07-29

Fix Resolution: grub - no_fix

CVE-2019-13627

Vulnerable Libraries - grubgrub-2.12, grubgrub-2.12

grubgrub-2.12

Gnu Distributions

Library home page: https://ftp.gnu.org/gnu/grub?wsslib=grub

Vulnerable Source Files (3)

/grub-core/lib/libgcrypt/mpi/ec.c
/grub-core/lib/libgcrypt/mpi/ec.c
/grub-core/lib/libgcrypt/mpi/ec.c

grubgrub-2.12

Gnu Distributions

Library home page: https://ftp.gnu.org/gnu/grub?wsslib=grub

Vulnerable Source Files (3)

/grub-core/lib/libgcrypt/mpi/ec.c
/grub-core/lib/libgcrypt/mpi/ec.c
/grub-core/lib/libgcrypt/mpi/ec.c

Found in HEAD commit: 34ea03480cbcacc530f29fed55eb2d7d0de23483

Found in base branch: develop

Vulnerability Details

It was discovered that there was a ECDSA timing attack in the libgcrypt20 cryptographic library. Version affected: 1.8.4-5, 1.7.6-2+deb9u3, and 1.6.3-2+deb8u4. Versions fixed: 1.8.5-2 and 1.6.3-2+deb8u7.

Publish Date: 2019-09-25

URL: CVE-2019-13627

CVSS 3 Score Details (6.3)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Local
    • Attack Complexity: High
    • Privileges Required: None
    • User Interaction: Required
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://gitlab.alpinelinux.org/alpine/aports/issues/10823

Release Date: 2019-09-25

Fix Resolution: 1.8.5

CVE-2025-0690

Vulnerable Library - grubgrub-2.12

Gnu Distributions

Library home page: https://ftp.gnu.org/gnu/grub?wsslib=grub

Found in HEAD commit: 34ea03480cbcacc530f29fed55eb2d7d0de23483

Found in base branch: develop

Vulnerable Source Files (3)

/grub-core/commands/read.c
/grub-core/commands/read.c
/grub-core/commands/read.c

Vulnerability Details

A flaw was found in grub2. The read command is used to read the keyboard input from the user,
while reads it keeps the input length in a 32-bit integer value which
is further used to reallocate the line buffer to accept the next
character. During this process, with a line big enough it's possible
to make this variable to overflow leading to a out-of-bounds write in
the heap based buffer. This flaw may be leveraged to corrupt grub's
internal critical data and secure boot bypass is not discarded as
consequence.

Publish Date: 2025-02-24

URL: CVE-2025-0690

CVSS 3 Score Details (6.1)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Physical
    • Attack Complexity: Low
    • Privileges Required: High
    • User Interaction: Required
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

CVE-2024-45779

Vulnerable Library - grubgrub-2.12

Gnu Distributions

Library home page: https://ftp.gnu.org/gnu/grub?wsslib=grub

Found in HEAD commit: 34ea03480cbcacc530f29fed55eb2d7d0de23483

Found in base branch: develop

Vulnerable Source Files (1)

/grub-core/fs/bfs.c

Vulnerability Details

A flaw was found in grub2. There's an integer overflow in the BFS file system driver. When
reading a file with indirect extent map grub2 fails to validate the
number of extent entries to be read. A crafted or corrupted BFS
filesystem may cause a integer overflow during the file reading,
leading to a Heap Ouf-of-Bounds read. As consequence sensitive data
may be leaked or the grub2 to crash.

Publish Date: 2025-03-03

URL: CVE-2024-45779

CVSS 3 Score Details (6.0)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Local
    • Attack Complexity: Low
    • Privileges Required: High
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: None
    • Availability Impact: High

For more information on CVSS3 Scores, click here.

CVE-2024-56738

Vulnerable Library - grubgrub-2.12

Gnu Distributions

Library home page: https://ftp.gnu.org/gnu/grub?wsslib=grub

Found in HEAD commit: 34ea03480cbcacc530f29fed55eb2d7d0de23483

Found in base branch: develop

Vulnerable Source Files (1)

/grub-core/lib/crypto.c

Vulnerability Details

GNU GRUB (aka GRUB2) through 2.12 does not use a constant-time algorithm for grub_crypto_memcmp and thus allows side-channel attacks.

Publish Date: 2024-12-29

URL: CVE-2024-56738

CVSS 3 Score Details (5.3)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Network
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Unchanged
  • Impact Metrics:
    • Confidentiality Impact: Low
    • Integrity Impact: None
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

CVE-2023-4693

Vulnerable Library - grubgrub-2.12

Gnu Distributions

Library home page: https://ftp.gnu.org/gnu/grub?wsslib=grub

Found in HEAD commit: 34ea03480cbcacc530f29fed55eb2d7d0de23483

Found in base branch: develop

Vulnerable Source Files (1)

/grub-core/fs/ntfs.c

Vulnerability Details

An out-of-bounds read flaw was found on grub2's NTFS filesystem driver. This issue may allow a physically present attacker to present a specially crafted NTFS file system image to read arbitrary memory locations. A successful attack allows sensitive data cached in memory or EFI variable values to be leaked, presenting a high Confidentiality risk.

Publish Date: 2023-10-25

URL: CVE-2023-4693

CVSS 3 Score Details (5.3)

Base Score Metrics:

  • Exploitability Metrics:
    • Attack Vector: Local
    • Attack Complexity: High
    • Privileges Required: High
    • User Interaction: None
    • Scope: Changed
  • Impact Metrics:
    • Confidentiality Impact: High
    • Integrity Impact: None
    • Availability Impact: None

For more information on CVSS3 Scores, click here.

@mend-for-github-com mend-for-github-com bot added the Mend: dependency security vulnerability Security vulnerability detected by Mend label Jan 15, 2025
@mend-for-github-com mend-for-github-com bot changed the title grubgrub-2.12: 19 vulnerabilities (highest severity is: 8.6) grubgrub-2.12: 30 vulnerabilities (highest severity is: 8.6) Feb 19, 2025
@mend-for-github-com mend-for-github-com bot changed the title grubgrub-2.12: 30 vulnerabilities (highest severity is: 8.6) grubgrub-2.12: 31 vulnerabilities (highest severity is: 8.6) Feb 27, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Mend: dependency security vulnerability Security vulnerability detected by Mend
Development

No branches or pull requests

0 participants