Описание
When reading data from disk, the grub's UDF filesystem module utilizes the user controlled data length metadata to allocate its internal buffers. In certain scenarios, while iterating through disk sectors, it assumes the read size from the disk is always smaller than the allocated buffer size which is not guaranteed. A crafted filesystem image may lead to a heap-based buffer overflow resulting in critical data to be corrupted, resulting in the risk of arbitrary code execution by-passing secure boot protections.
Релиз | Статус | Примечание |
---|---|---|
devel | not-affected | does not affect Secure Boot |
esm-infra-legacy/trusty | ignored | update incompatible with kernel |
esm-infra/bionic | not-affected | does not affect Secure Boot |
esm-infra/focal | not-affected | does not affect Secure Boot |
esm-infra/xenial | not-affected | does not affect Secure Boot |
focal | not-affected | does not affect Secure Boot |
jammy | not-affected | does not affect Secure Boot |
noble | not-affected | does not affect Secure Boot |
oracular | not-affected | does not affect Secure Boot |
plucky | not-affected | does not affect Secure Boot |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | needs-triage | |
esm-infra-legacy/trusty | ignored | update incompatible with kernel |
esm-infra/bionic | needs-triage | |
esm-infra/focal | needs-triage | |
esm-infra/xenial | needs-triage | |
focal | ignored | end of standard support, was needs-triage |
jammy | needs-triage | |
noble | needs-triage | |
oracular | ignored | end of life, was needs-triage |
plucky | needs-triage |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
devel | needs-triage | |
esm-infra/bionic | needs-triage | |
esm-infra/focal | needs-triage | |
esm-infra/xenial | needs-triage | |
focal | ignored | end of standard support, was needs-triage |
jammy | needs-triage | |
noble | needs-triage | |
oracular | ignored | end of life, was needs-triage |
plucky | needs-triage | |
upstream | needs-triage |
Показывать по
Ссылки на источники
EPSS
6.7 Medium
CVSS3
Связанные уязвимости
When reading data from disk, the grub's UDF filesystem module utilizes the user controlled data length metadata to allocate its internal buffers. In certain scenarios, while iterating through disk sectors, it assumes the read size from the disk is always smaller than the allocated buffer size which is not guaranteed. A crafted filesystem image may lead to a heap-based buffer overflow resulting in critical data to be corrupted, resulting in the risk of arbitrary code execution by-passing secure boot protections.
When reading data from disk, the grub's UDF filesystem module utilizes the user controlled data length metadata to allocate its internal buffers. In certain scenarios, while iterating through disk sectors, it assumes the read size from the disk is always smaller than the allocated buffer size which is not guaranteed. A crafted filesystem image may lead to a heap-based buffer overflow resulting in critical data to be corrupted, resulting in the risk of arbitrary code execution by-passing secure boot protections.
When reading data from disk, the grub's UDF filesystem module utilizes ...
When reading data from disk, the grub's UDF filesystem module utilizes the user controlled data length metadata to allocate its internal buffers. In certain scenarios, while iterating through disk sectors, it assumes the read size from the disk is always smaller than the allocated buffer size which is not guaranteed. A crafted filesystem image may lead to a heap-based buffer overflow resulting in critical data to be corrupted, resulting in the risk of arbitrary code execution by-passing secure boot protections.
Уязвимость функции grub_udf_read_block загрузчика операционных систем Grub2, позволяющая нарушителю оказать влияние на конфиденциальность, целостность и доступность защищаемой информации
EPSS
6.7 Medium
CVSS3