Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 915131 (CVE-2023-4692, CVE-2023-4693) - <sys-boot/grub-2.06-r9: Multiple vulnerabilities
Summary: <sys-boot/grub-2.06-r9: Multiple vulnerabilities
Status: IN_PROGRESS
Alias: CVE-2023-4692, CVE-2023-4693
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Gentoo Security
URL:
Whiteboard: B3 [glsa? cleanup]
Keywords:
Depends on: 915187
Blocks:
  Show dependency tree
 
Reported: 2023-10-03 19:07 UTC by Sam James
Modified: 2023-12-12 07:25 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Sam James archtester Gentoo Infrastructure gentoo-dev Security 2023-10-03 19:07:08 UTC
See https://lore.kernel.org/grub-devel/ZRxK8s4nQV2jBq%2F9@tomti.i.net-space.pl/T/#t.

We may want to just grab the fixes off Debian as they've backported it all the way back.
Comment 1 Sam James archtester Gentoo Infrastructure gentoo-dev Security 2023-10-03 19:08:07 UTC
CVE-2023-4692 grub2: OOB write when parsing the $ATTRIBUTE_LIST attribute for the $MFT file
5.3/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:N

There is an out-of-bounds write in grub-core/fs/ntfs.c. An attacker may
leverage this vulnerability by presenting a specially crafted NTFS filesystem
image leading to GRUB's heap metadata corruption. Additionally, in some
circumstances, the attack may also corrupt the UEFI firmware heap metadata.
As a result arbitrary code execution and secure boot protection bypass may
be achieved.

Reported-by: Maxim Suhanov

*******************************************************************************

CVE-2023-4693 grub2: OOB read when reading data from the resident $DATA attribute
5.3/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N

There is an out-of-bounds read at grub-core/fs/ntfs.c. A physically present
attacker may leverage that by presenting a specially crafted NTFS file system
image to read arbitrary memory locations. A successful attack may allow
sensitive data cached in memory or EFI variables values to be leaked presenting
a high confidentiality risk.

Reported-by: Maxim Suhanov
Comment 2 Larry the Git Cow gentoo-dev 2023-10-04 19:27:30 UTC
The bug has been referenced in the following commit(s):

https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=1dc4028278f21f9a4abaa9ad2bb99e53b4bf46b6

commit 1dc4028278f21f9a4abaa9ad2bb99e53b4bf46b6
Author:     Mike Gilbert <floppym@gentoo.org>
AuthorDate: 2023-10-04 19:25:25 +0000
Commit:     Mike Gilbert <floppym@gentoo.org>
CommitDate: 2023-10-04 19:27:04 +0000

    sys-boot/grub: security backports
    
    Bug: https://bugs.gentoo.org/915131
    Signed-off-by: Mike Gilbert <floppym@gentoo.org>

 sys-boot/grub/Manifest            |   1 +
 sys-boot/grub/grub-2.06-r9.ebuild | 346 ++++++++++++++++++++++++++++++++++++++
 2 files changed, 347 insertions(+)