{
  "threat_severity" : "Important",
  "public_date" : "2022-06-07T00:00:00Z",
  "bugzilla" : {
    "description" : "grub2: Integer underflow in grub_net_recv_ip4_packets",
    "id" : "2083339",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2083339"
  },
  "cvss3" : {
    "cvss3_base_score" : "8.1",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
    "status" : "verified"
  },
  "cwe" : "CWE-191",
  "details" : [ "Integer underflow in grub_net_recv_ip4_packets; A malicious crafted IP packet can lead to an integer underflow in grub_net_recv_ip4_packets() function on rsm->total_len value. Under certain circumstances the total_len value may end up wrapping around to a small integer number which will be used in memory allocation. If the attack succeeds in such way, subsequent operations can write past the end of the buffer.", "A flaw was found in grub2 when handling IPv4 packets. This flaw allows an attacker to craft a malicious packet, triggering an integer underflow in grub code. Consequently, the memory allocation for handling the packet data may be smaller than the size needed. This issue causes an out-of-bands write during packet handling, compromising data integrity, confidentiality issues, a denial of service, and remote code execution." ],
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 7",
    "release_date" : "2022-12-08T00:00:00Z",
    "advisory" : "RHSA-2022:8900",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7",
    "package" : "grub2-1:2.02-0.87.el7_9.11"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "release_date" : "2022-06-16T00:00:00Z",
    "advisory" : "RHSA-2022:5095",
    "cpe" : "cpe:/o:redhat:enterprise_linux:8",
    "package" : "grub2-1:2.02-123.el8_6.8"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions",
    "release_date" : "2022-06-16T00:00:00Z",
    "advisory" : "RHSA-2022:5098",
    "cpe" : "cpe:/o:redhat:rhel_e4s:8.1",
    "package" : "grub2-1:2.02-87.el8_1.10"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.2 Extended Update Support",
    "release_date" : "2022-06-16T00:00:00Z",
    "advisory" : "RHSA-2022:5100",
    "cpe" : "cpe:/o:redhat:rhel_eus:8.2",
    "package" : "grub2-1:2.02-87.el8_2.10"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8.4 Extended Update Support",
    "release_date" : "2022-06-16T00:00:00Z",
    "advisory" : "RHSA-2022:5096",
    "cpe" : "cpe:/o:redhat:rhel_eus:8.4",
    "package" : "grub2-1:2.02-99.el8_4.9"
  }, {
    "product_name" : "Red Hat Enterprise Linux 9",
    "release_date" : "2022-06-16T00:00:00Z",
    "advisory" : "RHSA-2022:5099",
    "cpe" : "cpe:/o:redhat:enterprise_linux:9",
    "package" : "grub2-1:2.06-27.el9_0.7"
  }, {
    "product_name" : "Red Hat Virtualization 4 for Red Hat Enterprise Linux 8",
    "release_date" : "2022-07-21T00:00:00Z",
    "advisory" : "RHSA-2022:5678",
    "cpe" : "cpe:/o:redhat:rhev_hypervisor:4.4::el8",
    "package" : "redhat-virtualization-host-0:4.5.1-202207170705_8.6"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2022-28733\nhttps://nvd.nist.gov/vuln/detail/CVE-2022-28733" ],
  "name" : "CVE-2022-28733",
  "csaw" : false
}