Количество 14
Количество 14
CVE-2025-0690
The read command is used to read the keyboard input from the user, while reads it keeps the input length in a 32-bit integer value which is further used to reallocate the line buffer to accept the next character. During this process, with a line big enough it's possible to make this variable to overflow leading to a out-of-bounds write in the heap based buffer. This flaw may be leveraged to corrupt grub's internal critical data and secure boot bypass is not discarded as consequence.
CVE-2025-0690
The read command is used to read the keyboard input from the user, while reads it keeps the input length in a 32-bit integer value which is further used to reallocate the line buffer to accept the next character. During this process, with a line big enough it's possible to make this variable to overflow leading to a out-of-bounds write in the heap based buffer. This flaw may be leveraged to corrupt grub's internal critical data and secure boot bypass is not discarded as consequence.
CVE-2025-0690
The read command is used to read the keyboard input from the user, while reads it keeps the input length in a 32-bit integer value which is further used to reallocate the line buffer to accept the next character. During this process, with a line big enough it's possible to make this variable to overflow leading to a out-of-bounds write in the heap based buffer. This flaw may be leveraged to corrupt grub's internal critical data and secure boot bypass is not discarded as consequence.
CVE-2025-0690
Grub2: read: integer overflow may lead to out-of-bounds write
CVE-2025-0690
The read command is used to read the keyboard input from the user, whi ...
GHSA-9fg2-2f57-9p5h
The read command is used to read the keyboard input from the user, while reads it keeps the input length in a 32-bit integer value which is further used to reallocate the line buffer to accept the next character. During this process, with a line big enough it's possible to make this variable to overflow leading to a out-of-bounds write in the heap based buffer. This flaw may be leveraged to corrupt grub's internal critical data and secure boot bypass is not discarded as consequence.
BDU:2025-07123
Уязвимость загрузчика операционных систем Grub2, связанная с записью за пределами границ, позволяющая нарушителю вызвать отказ в обслуживании
ELSA-2025-6990
ELSA-2025-6990: grub2 security update (MODERATE)
SUSE-SU-2025:0629-1
Security update for grub2
SUSE-SU-2025:0607-1
Security update for grub2
SUSE-SU-2025:0588-1
Security update for grub2
SUSE-SU-2025:0587-1
Security update for grub2
SUSE-SU-2025:0586-1
Security update for grub2
ROS-20250818-06
Множественные уязвимости grub2-common
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2025-0690 The read command is used to read the keyboard input from the user, while reads it keeps the input length in a 32-bit integer value which is further used to reallocate the line buffer to accept the next character. During this process, with a line big enough it's possible to make this variable to overflow leading to a out-of-bounds write in the heap based buffer. This flaw may be leveraged to corrupt grub's internal critical data and secure boot bypass is not discarded as consequence. | CVSS3: 6.1 | 0% Низкий | 8 месяцев назад | |
CVE-2025-0690 The read command is used to read the keyboard input from the user, while reads it keeps the input length in a 32-bit integer value which is further used to reallocate the line buffer to accept the next character. During this process, with a line big enough it's possible to make this variable to overflow leading to a out-of-bounds write in the heap based buffer. This flaw may be leveraged to corrupt grub's internal critical data and secure boot bypass is not discarded as consequence. | CVSS3: 6.1 | 0% Низкий | 9 месяцев назад | |
CVE-2025-0690 The read command is used to read the keyboard input from the user, while reads it keeps the input length in a 32-bit integer value which is further used to reallocate the line buffer to accept the next character. During this process, with a line big enough it's possible to make this variable to overflow leading to a out-of-bounds write in the heap based buffer. This flaw may be leveraged to corrupt grub's internal critical data and secure boot bypass is not discarded as consequence. | CVSS3: 6.1 | 0% Низкий | 8 месяцев назад | |
CVE-2025-0690 Grub2: read: integer overflow may lead to out-of-bounds write | CVSS3: 6.1 | 0% Низкий | 2 месяца назад | |
CVE-2025-0690 The read command is used to read the keyboard input from the user, whi ... | CVSS3: 6.1 | 0% Низкий | 8 месяцев назад | |
GHSA-9fg2-2f57-9p5h The read command is used to read the keyboard input from the user, while reads it keeps the input length in a 32-bit integer value which is further used to reallocate the line buffer to accept the next character. During this process, with a line big enough it's possible to make this variable to overflow leading to a out-of-bounds write in the heap based buffer. This flaw may be leveraged to corrupt grub's internal critical data and secure boot bypass is not discarded as consequence. | CVSS3: 6.1 | 0% Низкий | 8 месяцев назад | |
BDU:2025-07123 Уязвимость загрузчика операционных систем Grub2, связанная с записью за пределами границ, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 7.8 | 0% Низкий | 9 месяцев назад | |
ELSA-2025-6990 ELSA-2025-6990: grub2 security update (MODERATE) | 6 месяцев назад | |||
SUSE-SU-2025:0629-1 Security update for grub2 | 9 месяцев назад | |||
SUSE-SU-2025:0607-1 Security update for grub2 | 9 месяцев назад | |||
SUSE-SU-2025:0588-1 Security update for grub2 | 9 месяцев назад | |||
SUSE-SU-2025:0587-1 Security update for grub2 | 9 месяцев назад | |||
SUSE-SU-2025:0586-1 Security update for grub2 | 9 месяцев назад | |||
ROS-20250818-06 Множественные уязвимости grub2-common | CVSS3: 8.8 | 3 месяца назад |
Уязвимостей на страницу