Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-0690

Опубликовано: 24 фев. 2025
Источник: debian
EPSS Низкий

Описание

The read command is used to read the keyboard input from the user, while reads it keeps the input length in a 32-bit integer value which is further used to reallocate the line buffer to accept the next character. During this process, with a line big enough it's possible to make this variable to overflow leading to a out-of-bounds write in the heap based buffer. This flaw may be leveraged to corrupt grub's internal critical data and secure boot bypass is not discarded as consequence.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
grub2fixed2.12-6package
grub2no-dsabookwormpackage

Примечания

  • https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html

  • https://www.openwall.com/lists/oss-security/2025/02/18/3

EPSS

Процентиль: 9%
0.00036
Низкий

Связанные уязвимости

CVSS3: 6.1
ubuntu
6 месяцев назад

The read command is used to read the keyboard input from the user, while reads it keeps the input length in a 32-bit integer value which is further used to reallocate the line buffer to accept the next character. During this process, with a line big enough it's possible to make this variable to overflow leading to a out-of-bounds write in the heap based buffer. This flaw may be leveraged to corrupt grub's internal critical data and secure boot bypass is not discarded as consequence.

CVSS3: 6.1
redhat
6 месяцев назад

The read command is used to read the keyboard input from the user, while reads it keeps the input length in a 32-bit integer value which is further used to reallocate the line buffer to accept the next character. During this process, with a line big enough it's possible to make this variable to overflow leading to a out-of-bounds write in the heap based buffer. This flaw may be leveraged to corrupt grub's internal critical data and secure boot bypass is not discarded as consequence.

CVSS3: 6.1
nvd
6 месяцев назад

The read command is used to read the keyboard input from the user, while reads it keeps the input length in a 32-bit integer value which is further used to reallocate the line buffer to accept the next character. During this process, with a line big enough it's possible to make this variable to overflow leading to a out-of-bounds write in the heap based buffer. This flaw may be leveraged to corrupt grub's internal critical data and secure boot bypass is not discarded as consequence.

CVSS3: 6.1
github
6 месяцев назад

The read command is used to read the keyboard input from the user, while reads it keeps the input length in a 32-bit integer value which is further used to reallocate the line buffer to accept the next character. During this process, with a line big enough it's possible to make this variable to overflow leading to a out-of-bounds write in the heap based buffer. This flaw may be leveraged to corrupt grub's internal critical data and secure boot bypass is not discarded as consequence.

CVSS3: 7.8
fstec
6 месяцев назад

Уязвимость загрузчика операционных систем Grub2, связанная с записью за пределами границ, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 9%
0.00036
Низкий