See https://lore.kernel.org/grub-devel/ZRxK8s4nQV2jBq%2F9@tomti.i.net-space.pl/T/#t. We may want to just grab the fixes off Debian as they've backported it all the way back.
CVE-2023-4692 grub2: OOB write when parsing the $ATTRIBUTE_LIST attribute for the $MFT file 5.3/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:N There is an out-of-bounds write in grub-core/fs/ntfs.c. An attacker may leverage this vulnerability by presenting a specially crafted NTFS filesystem image leading to GRUB's heap metadata corruption. Additionally, in some circumstances, the attack may also corrupt the UEFI firmware heap metadata. As a result arbitrary code execution and secure boot protection bypass may be achieved. Reported-by: Maxim Suhanov ******************************************************************************* CVE-2023-4693 grub2: OOB read when reading data from the resident $DATA attribute 5.3/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N There is an out-of-bounds read at grub-core/fs/ntfs.c. A physically present attacker may leverage that by presenting a specially crafted NTFS file system image to read arbitrary memory locations. A successful attack may allow sensitive data cached in memory or EFI variables values to be leaked presenting a high confidentiality risk. Reported-by: Maxim Suhanov
The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=1dc4028278f21f9a4abaa9ad2bb99e53b4bf46b6 commit 1dc4028278f21f9a4abaa9ad2bb99e53b4bf46b6 Author: Mike Gilbert <floppym@gentoo.org> AuthorDate: 2023-10-04 19:25:25 +0000 Commit: Mike Gilbert <floppym@gentoo.org> CommitDate: 2023-10-04 19:27:04 +0000 sys-boot/grub: security backports Bug: https://bugs.gentoo.org/915131 Signed-off-by: Mike Gilbert <floppym@gentoo.org> sys-boot/grub/Manifest | 1 + sys-boot/grub/grub-2.06-r9.ebuild | 346 ++++++++++++++++++++++++++++++++++++++ 2 files changed, 347 insertions(+)