Rapid7 Vulnerability & Exploit Database

CentOS Linux: CVE-2021-3696: Important: grub2, mokutil, shim, and shim-unsigned-x64 security update (Multiple Advisories)

Free InsightVM Trial No Credit Card Necessary
2024 Attack Intel Report Latest research by Rapid7 Labs
Back to Search

CentOS Linux: CVE-2021-3696: Important: grub2, mokutil, shim, and shim-unsigned-x64 security update (Multiple Advisories)

Severity
7
CVSS
(AV:L/AC:M/Au:N/C:C/I:C/A:C)
Published
06/16/2022
Created
06/18/2022
Added
06/17/2022
Modified
06/19/2023

Description

A heap out-of-bounds write may heppen during the handling of Huffman tables in the PNG reader. This may lead to data corruption in the heap space. Confidentiality, Integrity and Availablity impact may be considered Low as it's very complex to an attacker control the encoding and positioning of corrupted Huffman entries to achieve results such as arbitrary code execution and/or secure boot circumvention. This flaw affects grub2 versions prior grub-2.12.

Solution(s)

  • centos-upgrade-grub2-common
  • centos-upgrade-grub2-debuginfo
  • centos-upgrade-grub2-debugsource
  • centos-upgrade-grub2-efi-aa64-modules
  • centos-upgrade-grub2-efi-ia32
  • centos-upgrade-grub2-efi-ia32-cdboot
  • centos-upgrade-grub2-efi-ia32-modules
  • centos-upgrade-grub2-efi-x64
  • centos-upgrade-grub2-efi-x64-cdboot
  • centos-upgrade-grub2-efi-x64-modules
  • centos-upgrade-grub2-emu-debuginfo
  • centos-upgrade-grub2-pc
  • centos-upgrade-grub2-pc-modules
  • centos-upgrade-grub2-ppc64le-modules
  • centos-upgrade-grub2-tools
  • centos-upgrade-grub2-tools-debuginfo
  • centos-upgrade-grub2-tools-efi
  • centos-upgrade-grub2-tools-efi-debuginfo
  • centos-upgrade-grub2-tools-extra
  • centos-upgrade-grub2-tools-extra-debuginfo
  • centos-upgrade-grub2-tools-minimal
  • centos-upgrade-grub2-tools-minimal-debuginfo
  • centos-upgrade-mokutil
  • centos-upgrade-mokutil-debuginfo
  • centos-upgrade-mokutil-debugsource
  • centos-upgrade-shim-ia32
  • centos-upgrade-shim-x64

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;