CVE-2021-3696

A heap out-of-bounds write may heppen during the handling of Huffman tables in the PNG reader. This may lead to data corruption in the heap space. Confidentiality, Integrity and Availablity impact may be considered Low as it's very complex to an attacker control the encoding and positioning of corrupted Huffman entries to achieve results such as arbitrary code execution and/or secure boot circumvention. This flaw affects grub2 versions prior grub-2.12.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
4.5 MEDIUM
LOCAL
HIGH
LOW
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 31%
VendorProductVersion
gnugrub2
2.00 ≤
𝑥
< 2.12
redhatdeveloper_tools
1.0
redhatopenshift
3.0
redhatenterprise_linux
8.0
redhatenterprise_linux
8.1
redhatenterprise_linux
8.4
redhatenterprise_linux
9.0
redhatenterprise_linux_eus
8.2
redhatenterprise_linux_eus
8.4
redhatenterprise_linux_eus
8.6
redhatenterprise_linux_eus
9.0
redhatenterprise_linux_for_power_little_endian
8.0
redhatenterprise_linux_for_power_little_endian
9.0
redhatenterprise_linux_for_power_little_endian_eus
8.2
redhatenterprise_linux_for_power_little_endian_eus
8.4
redhatenterprise_linux_for_power_little_endian_eus
8.6
redhatenterprise_linux_for_power_little_endian_eus
9.0
redhatenterprise_linux_server_aus
8.2
redhatenterprise_linux_server_aus
8.4
redhatenterprise_linux_server_aus
8.6
redhatenterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions
8.1
redhatenterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions
8.2
redhatenterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions
8.4
redhatenterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions
8.6
redhatenterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions
9.0
redhatenterprise_linux_server_tus
8.2
redhatenterprise_linux_server_tus
8.4
redhatenterprise_linux_server_tus
8.6
redhatopenshift_container_platform
4.6
redhatopenshift_container_platform
4.9
redhatopenshift_container_platform
4.10
redhatcodeready_linux_builder
-
netappontap_select_deploy_administration_utility
-
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
grub2
bullseye (security)
2.06-3~deb11u6
fixed
bullseye
2.06-3~deb11u6
fixed
stretch
ignored
jessie
ignored
bookworm
2.06-13+deb12u1
fixed
bookworm (security)
2.06-13+deb12u1
fixed
sid
2.12-5
fixed
trixie
2.12-5
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
grub2
noble
not-affected
mantic
not-affected
lunar
not-affected
kinetic
not-affected
jammy
not-affected
impish
ignored
focal
not-affected
bionic
not-affected
xenial
not-affected
trusty
not-affected
grub2-signed
noble
not-affected
mantic
not-affected
lunar
not-affected
kinetic
ignored
jammy
Fixed 1.187.3~22.04.1
released
focal
Fixed 1.187.3~20.04.1
released
bionic
Fixed 1.187.3~18.04.1
released
xenial
needed
trusty
needed
grub2-unsigned
noble
not-affected
mantic
not-affected
lunar
not-affected
kinetic
ignored
jammy
Fixed 2.06-2ubuntu14.1
released
focal
Fixed 2.06-2ubuntu14.1
released
bionic
Fixed 2.06-2ubuntu14.1
released
xenial
needed
trusty
dne