Описание
Integer underflow in grub_net_recv_ip4_packets; A malicious crafted IP packet can lead to an integer underflow in grub_net_recv_ip4_packets() function on rsm->total_len value. Under certain circumstances the total_len value may end up wrapping around to a small integer number which will be used in memory allocation. If the attack succeeds in such way, subsequent operations can write past the end of the buffer.
Релиз | Статус | Примечание |
---|---|---|
bionic | ignored | end of standard support, was needed |
devel | not-affected | does not affect Secure Boot |
esm-infra-legacy/trusty | not-affected | does not affect Secure Boot |
esm-infra/bionic | not-affected | does not affect Secure Boot |
esm-infra/focal | not-affected | does not affect Secure Boot |
esm-infra/xenial | not-affected | does not affect Secure Boot |
focal | not-affected | does not affect Secure Boot |
impish | ignored | end of life |
jammy | not-affected | does not affect Secure Boot |
kinetic | not-affected | does not affect Secure Boot |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
bionic | released | 1.187.3~18.04.1 |
devel | not-affected | 1.193 |
esm-infra-legacy/trusty | needs-triage | |
esm-infra/bionic | not-affected | 1.187.3~18.04.1 |
esm-infra/focal | not-affected | 1.187.3~20.04.1 |
esm-infra/xenial | needed | |
focal | released | 1.187.3~20.04.1 |
jammy | released | 1.187.3~22.04.1 |
kinetic | ignored | end of life |
lunar | not-affected | 1.192 |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
bionic | released | 2.06-2ubuntu14.1 |
devel | not-affected | 2.06-2ubuntu17 |
esm-infra-legacy/trusty | DNE | |
esm-infra/bionic | not-affected | 2.06-2ubuntu14.1 |
esm-infra/focal | not-affected | 2.06-2ubuntu14.1 |
esm-infra/xenial | needed | |
focal | released | 2.06-2ubuntu14.1 |
jammy | released | 2.06-2ubuntu14.1 |
kinetic | ignored | end of life |
lunar | not-affected | 2.06-2ubuntu16 |
Показывать по
EPSS
8.1 High
CVSS3
Связанные уязвимости
Integer underflow in grub_net_recv_ip4_packets; A malicious crafted IP packet can lead to an integer underflow in grub_net_recv_ip4_packets() function on rsm->total_len value. Under certain circumstances the total_len value may end up wrapping around to a small integer number which will be used in memory allocation. If the attack succeeds in such way, subsequent operations can write past the end of the buffer.
Integer underflow in grub_net_recv_ip4_packets; A malicious crafted IP packet can lead to an integer underflow in grub_net_recv_ip4_packets() function on rsm->total_len value. Under certain circumstances the total_len value may end up wrapping around to a small integer number which will be used in memory allocation. If the attack succeeds in such way, subsequent operations can write past the end of the buffer.
Integer underflow in grub_net_recv_ip4_packets; A malicious crafted IP ...
Integer underflow in grub_net_recv_ip4_packets; A malicious crafted IP packet can lead to an integer underflow in grub_net_recv_ip4_packets() function on rsm->total_len value. Under certain circumstances the total_len value may end up wrapping around to a small integer number which will be used in memory allocation. If the attack succeeds in such way, subsequent operations can write past the end of the buffer.
EPSS
8.1 High
CVSS3