Bug 2092613 (CVE-2022-28736)

Summary: CVE-2022-28736 grub2: use-after-free in grub_cmd_chainloader()
Product: [Other] Security Response Reporter: Marco Benatto <mbenatto>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: bootloader-eng-team, jaredz, mlewando, pjanda, pjones, pkotvan, rharwood, security-response-team
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: grub 2.12 Doc Type: If docs needed, set a value
Doc Text:
A use-after-free vulnerability was found on grub2's chainloader command. This flaw allows an attacker to gain access to restricted data or cause arbitrary code execution if they can establish control from grub's memory allocation pattern.
Story Points: ---
Clone Of: Environment:
Last Closed: 2022-06-16 22:37:10 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 2092620, 2092621, 2092622, 2092623, 2092624, 2092625, 2092627    
Bug Blocks: 1991681    

Description Marco Benatto 2022-06-01 20:42:37 UTC
There's a use-after-free vulnerability in grub_cmd_chainloader() function. The chainloader command is used to boot up Operating Systems that doesn't support multiboot and do not have direct support from grub2, when executing chainloader more than once a use-after-free vulnerability is triggered. If an attacker can control the grub's memory allocation pattern sensitive data may be exposed and arbitrary code execution can be executed.

Comment 2 errata-xmlrpc 2022-06-16 13:51:37 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions

Via RHSA-2022:5098 https://access.redhat.com/errata/RHSA-2022:5098

Comment 3 errata-xmlrpc 2022-06-16 14:55:57 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.4 Extended Update Support

Via RHSA-2022:5096 https://access.redhat.com/errata/RHSA-2022:5096

Comment 4 errata-xmlrpc 2022-06-16 15:24:10 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2022:5099 https://access.redhat.com/errata/RHSA-2022:5099

Comment 5 errata-xmlrpc 2022-06-16 15:34:12 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2022:5095 https://access.redhat.com/errata/RHSA-2022:5095

Comment 6 errata-xmlrpc 2022-06-16 15:46:21 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.2 Extended Update Support

Via RHSA-2022:5100 https://access.redhat.com/errata/RHSA-2022:5100

Comment 7 Product Security DevOps Team 2022-06-16 22:37:08 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2022-28736