A crafted JPEG image may lead the JPEG reader to underflow its data pointer, allowing user-controlled data to be written in heap. To a successful to be performed the attacker needs to perform some triage over the heap layout and craft an image with a malicious format and payload. This vulnerability can lead to data corruption and eventual code execution or secure boot circumvention. This flaw affects grub2 versions prior grub-2.12.
{ "availability": "No subscription required", "binaries": [ { "binary_name": "grub-efi-amd64", "binary_version": "2.06-2ubuntu14.1" }, { "binary_name": "grub-efi-amd64-bin", "binary_version": "2.06-2ubuntu14.1" }, { "binary_name": "grub-efi-amd64-dbg", "binary_version": "2.06-2ubuntu14.1" }, { "binary_name": "grub-efi-arm64", "binary_version": "2.06-2ubuntu14.1" }, { "binary_name": "grub-efi-arm64-bin", "binary_version": "2.06-2ubuntu14.1" }, { "binary_name": "grub-efi-arm64-dbg", "binary_version": "2.06-2ubuntu14.1" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_name": "grub-efi-amd64", "binary_version": "2.06-2ubuntu14.1" }, { "binary_name": "grub-efi-amd64-bin", "binary_version": "2.06-2ubuntu14.1" }, { "binary_name": "grub-efi-amd64-dbg", "binary_version": "2.06-2ubuntu14.1" }, { "binary_name": "grub-efi-arm64", "binary_version": "2.06-2ubuntu14.1" }, { "binary_name": "grub-efi-arm64-bin", "binary_version": "2.06-2ubuntu14.1" }, { "binary_name": "grub-efi-arm64-dbg", "binary_version": "2.06-2ubuntu14.1" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_name": "grub-efi-amd64", "binary_version": "2.06-2ubuntu14.1" }, { "binary_name": "grub-efi-amd64-bin", "binary_version": "2.06-2ubuntu14.1" }, { "binary_name": "grub-efi-amd64-dbg", "binary_version": "2.06-2ubuntu14.1" }, { "binary_name": "grub-efi-arm64", "binary_version": "2.06-2ubuntu14.1" }, { "binary_name": "grub-efi-arm64-bin", "binary_version": "2.06-2ubuntu14.1" }, { "binary_name": "grub-efi-arm64-dbg", "binary_version": "2.06-2ubuntu14.1" } ] }