Количество 12
Количество 12

CVE-2025-0690
The read command is used to read the keyboard input from the user, while reads it keeps the input length in a 32-bit integer value which is further used to reallocate the line buffer to accept the next character. During this process, with a line big enough it's possible to make this variable to overflow leading to a out-of-bounds write in the heap based buffer. This flaw may be leveraged to corrupt grub's internal critical data and secure boot bypass is not discarded as consequence.

CVE-2025-0690
The read command is used to read the keyboard input from the user, while reads it keeps the input length in a 32-bit integer value which is further used to reallocate the line buffer to accept the next character. During this process, with a line big enough it's possible to make this variable to overflow leading to a out-of-bounds write in the heap based buffer. This flaw may be leveraged to corrupt grub's internal critical data and secure boot bypass is not discarded as consequence.

CVE-2025-0690
The read command is used to read the keyboard input from the user, while reads it keeps the input length in a 32-bit integer value which is further used to reallocate the line buffer to accept the next character. During this process, with a line big enough it's possible to make this variable to overflow leading to a out-of-bounds write in the heap based buffer. This flaw may be leveraged to corrupt grub's internal critical data and secure boot bypass is not discarded as consequence.
CVE-2025-0690
The read command is used to read the keyboard input from the user, whi ...
GHSA-9fg2-2f57-9p5h
The read command is used to read the keyboard input from the user, while reads it keeps the input length in a 32-bit integer value which is further used to reallocate the line buffer to accept the next character. During this process, with a line big enough it's possible to make this variable to overflow leading to a out-of-bounds write in the heap based buffer. This flaw may be leveraged to corrupt grub's internal critical data and secure boot bypass is not discarded as consequence.

BDU:2025-07123
Уязвимость загрузчика операционных систем Grub2, связанная с записью за пределами границ, позволяющая нарушителю вызвать отказ в обслуживании
ELSA-2025-6990
ELSA-2025-6990: grub2 security update (MODERATE)

SUSE-SU-2025:0629-1
Security update for grub2

SUSE-SU-2025:0607-1
Security update for grub2

SUSE-SU-2025:0588-1
Security update for grub2

SUSE-SU-2025:0587-1
Security update for grub2

SUSE-SU-2025:0586-1
Security update for grub2
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2025-0690 The read command is used to read the keyboard input from the user, while reads it keeps the input length in a 32-bit integer value which is further used to reallocate the line buffer to accept the next character. During this process, with a line big enough it's possible to make this variable to overflow leading to a out-of-bounds write in the heap based buffer. This flaw may be leveraged to corrupt grub's internal critical data and secure boot bypass is not discarded as consequence. | CVSS3: 6.1 | 0% Низкий | 6 месяцев назад |
![]() | CVE-2025-0690 The read command is used to read the keyboard input from the user, while reads it keeps the input length in a 32-bit integer value which is further used to reallocate the line buffer to accept the next character. During this process, with a line big enough it's possible to make this variable to overflow leading to a out-of-bounds write in the heap based buffer. This flaw may be leveraged to corrupt grub's internal critical data and secure boot bypass is not discarded as consequence. | CVSS3: 6.1 | 0% Низкий | 6 месяцев назад |
![]() | CVE-2025-0690 The read command is used to read the keyboard input from the user, while reads it keeps the input length in a 32-bit integer value which is further used to reallocate the line buffer to accept the next character. During this process, with a line big enough it's possible to make this variable to overflow leading to a out-of-bounds write in the heap based buffer. This flaw may be leveraged to corrupt grub's internal critical data and secure boot bypass is not discarded as consequence. | CVSS3: 6.1 | 0% Низкий | 6 месяцев назад |
CVE-2025-0690 The read command is used to read the keyboard input from the user, whi ... | CVSS3: 6.1 | 0% Низкий | 6 месяцев назад | |
GHSA-9fg2-2f57-9p5h The read command is used to read the keyboard input from the user, while reads it keeps the input length in a 32-bit integer value which is further used to reallocate the line buffer to accept the next character. During this process, with a line big enough it's possible to make this variable to overflow leading to a out-of-bounds write in the heap based buffer. This flaw may be leveraged to corrupt grub's internal critical data and secure boot bypass is not discarded as consequence. | CVSS3: 6.1 | 0% Низкий | 6 месяцев назад | |
![]() | BDU:2025-07123 Уязвимость загрузчика операционных систем Grub2, связанная с записью за пределами границ, позволяющая нарушителю вызвать отказ в обслуживании | CVSS3: 7.8 | 0% Низкий | 6 месяцев назад |
ELSA-2025-6990 ELSA-2025-6990: grub2 security update (MODERATE) | 3 месяца назад | |||
![]() | SUSE-SU-2025:0629-1 Security update for grub2 | 6 месяцев назад | ||
![]() | SUSE-SU-2025:0607-1 Security update for grub2 | 6 месяцев назад | ||
![]() | SUSE-SU-2025:0588-1 Security update for grub2 | 6 месяцев назад | ||
![]() | SUSE-SU-2025:0587-1 Security update for grub2 | 6 месяцев назад | ||
![]() | SUSE-SU-2025:0586-1 Security update for grub2 | 6 месяцев назад |
Уязвимостей на страницу