Out-of-bounds write when handling split HTTP headers; When handling split HTTP headers, GRUB2 HTTP code accidentally moves its internal data buffer point by one position. This can lead to a out-of-bound write further when parsing the HTTP request, writing a NULL byte past the buffer. It's conceivable that an attacker controlled set of packets can lead to corruption of the GRUB2's internal memory metadata.
Subscriptions
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-33173 | Out-of-bounds write when handling split HTTP headers; When handling split HTTP headers, GRUB2 HTTP code accidentally moves its internal data buffer point by one position. This can lead to a out-of-bound write further when parsing the HTTP request, writing a NULL byte past the buffer. It's conceivable that an attacker controlled set of packets can lead to corruption of the GRUB2's internal memory metadata. |
Ubuntu USN |
USN-6355-1 | GRUB2 vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: canonical
Published:
Updated: 2025-02-13T16:32:36.223Z
Reserved: 2022-04-05T21:59:08.760Z
Link: CVE-2022-28734
No data.
Status : Modified
Published: 2023-07-20T01:15:10.243
Modified: 2024-11-21T06:57:49.817
Link: CVE-2022-28734
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Ubuntu USN