Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2024-45781

Опубликовано: 18 фев. 2025
Источник: debian
EPSS Низкий

Описание

A flaw was found in grub2. When reading a symbolic link's name from a UFS filesystem, grub2 fails to validate the string length taken as an input. The lack of validation may lead to a heap out-of-bounds write, causing data integrity issues and eventually allowing an attacker to circumvent secure boot protections.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
grub2fixed2.12-6package
grub2no-dsabookwormpackage

Примечания

  • https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html

  • https://www.openwall.com/lists/oss-security/2025/02/18/3

EPSS

Процентиль: 19%
0.00061
Низкий

Связанные уязвимости

CVSS3: 6.7
ubuntu
9 месяцев назад

A flaw was found in grub2. When reading a symbolic link's name from a UFS filesystem, grub2 fails to validate the string length taken as an input. The lack of validation may lead to a heap out-of-bounds write, causing data integrity issues and eventually allowing an attacker to circumvent secure boot protections.

CVSS3: 6.7
redhat
9 месяцев назад

A flaw was found in grub2. When reading a symbolic link's name from a UFS filesystem, grub2 fails to validate the string length taken as an input. The lack of validation may lead to a heap out-of-bounds write, causing data integrity issues and eventually allowing an attacker to circumvent secure boot protections.

CVSS3: 6.7
nvd
9 месяцев назад

A flaw was found in grub2. When reading a symbolic link's name from a UFS filesystem, grub2 fails to validate the string length taken as an input. The lack of validation may lead to a heap out-of-bounds write, causing data integrity issues and eventually allowing an attacker to circumvent secure boot protections.

CVSS3: 6.7
msrc
2 месяца назад

Grub2: fs/ufs: oob write in the heap

CVSS3: 6.7
github
9 месяцев назад

A flaw was found in grub2. When reading a symbolic link's name from a UFS filesystem, grub2 fails to validate the string length taken as an input. The lack of validation may lead to a heap out-of-bounds write, causing data integrity issues and eventually allowing an attacker to circumvent secure boot protections.

EPSS

Процентиль: 19%
0.00061
Низкий