Out-of-bounds write when handling split HTTP headers; When handling split HTTP headers, GRUB2 HTTP code accidentally moves its internal data buffer point by one position. This can lead to a out-of-bound write further when parsing the HTTP request, writing a NULL byte past the buffer. It's conceivable that an attacker controlled set of packets can lead to corruption of the GRUB2's internal memory metadata.
Advisories
Source ID Title
EUVD EUVD EUVD-2022-33173 Out-of-bounds write when handling split HTTP headers; When handling split HTTP headers, GRUB2 HTTP code accidentally moves its internal data buffer point by one position. This can lead to a out-of-bound write further when parsing the HTTP request, writing a NULL byte past the buffer. It's conceivable that an attacker controlled set of packets can lead to corruption of the GRUB2's internal memory metadata.
Ubuntu USN Ubuntu USN USN-6355-1 GRUB2 vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: canonical

Published:

Updated: 2025-02-13T16:32:36.223Z

Reserved: 2022-04-05T21:59:08.760Z

Link: CVE-2022-28734

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2023-07-20T01:15:10.243

Modified: 2024-11-21T06:57:49.817

Link: CVE-2022-28734

cve-icon Redhat

Severity : Moderate

Publid Date: 2022-06-07T17:00:00Z

Links: CVE-2022-28734 - Bugzilla

cve-icon OpenCVE Enrichment

No data.