A crafted JPEG image may lead the JPEG reader to underflow its data pointer, allowing user-controlled data to be written in heap. To a successful to be performed the attacker needs to perform some triage over the heap layout and craft an image with a malicious format and payload. This vulnerability can lead to data corruption and eventual code execution or secure boot circumvention. This flaw affects grub2 versions prior grub-2.12.
{
"binaries": [
{
"binary_name": "grub-efi-amd64",
"binary_version": "2.04-1ubuntu44.1.2"
},
{
"binary_name": "grub-efi-amd64-bin",
"binary_version": "2.04-1ubuntu44.1.2"
},
{
"binary_name": "grub-efi-arm64",
"binary_version": "2.04-1ubuntu44.1.2"
},
{
"binary_name": "grub-efi-arm64-bin",
"binary_version": "2.04-1ubuntu44.1.2"
}
]
}{
"availability": "No subscription required",
"binaries": [
{
"binary_name": "grub-efi-amd64",
"binary_version": "2.06-2ubuntu14.1"
},
{
"binary_name": "grub-efi-amd64-bin",
"binary_version": "2.06-2ubuntu14.1"
},
{
"binary_name": "grub-efi-arm64",
"binary_version": "2.06-2ubuntu14.1"
},
{
"binary_name": "grub-efi-arm64-bin",
"binary_version": "2.06-2ubuntu14.1"
}
]
}{
"availability": "No subscription required",
"binaries": [
{
"binary_name": "grub-efi-amd64",
"binary_version": "2.06-2ubuntu14.1"
},
{
"binary_name": "grub-efi-amd64-bin",
"binary_version": "2.06-2ubuntu14.1"
},
{
"binary_name": "grub-efi-arm64",
"binary_version": "2.06-2ubuntu14.1"
},
{
"binary_name": "grub-efi-arm64-bin",
"binary_version": "2.06-2ubuntu14.1"
}
]
}{
"availability": "No subscription required",
"binaries": [
{
"binary_name": "grub-efi-amd64",
"binary_version": "2.06-2ubuntu14.1"
},
{
"binary_name": "grub-efi-amd64-bin",
"binary_version": "2.06-2ubuntu14.1"
},
{
"binary_name": "grub-efi-arm64",
"binary_version": "2.06-2ubuntu14.1"
},
{
"binary_name": "grub-efi-arm64-bin",
"binary_version": "2.06-2ubuntu14.1"
}
]
}