Untriaged
Permalink
CVE-2024-45781
6.7 MEDIUM
- CVSS version: 3.1
- Attack vector (AV): LOCAL
- Attack complexity (AC): LOW
- Privileges required (PR): HIGH
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): HIGH
- Integrity impact (I): HIGH
- Availability impact (A): HIGH
Grub2: fs/ufs: oob write in the heap
A flaw was found in grub2. When reading a symbolic link's name from a UFS filesystem, grub2 fails to validate the string length taken as an input. The lack of validation may lead to a heap out-of-bounds write, causing data integrity issues and eventually allowing an attacker to circumvent secure boot protections.
References
- https://access.redhat.com/security/cve/CVE-2024-45781 x_refsource_REDHAT vdb-entry
- RHBZ#2345857 issue-tracking x_refsource_REDHAT
- RHBZ#2345857 issue-tracking x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2024-45781 x_refsource_REDHAT vdb-entry
- https://access.redhat.com/security/cve/CVE-2024-45781 x_refsource_REDHAT vdb-entry
- RHBZ#2345857 issue-tracking x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2024-45781 x_refsource_REDHAT vdb-entry
- RHBZ#2345857 issue-tracking x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2024-45781 x_refsource_REDHAT vdb-entry
- RHBZ#2345857 issue-tracking x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2024-45781 x_refsource_REDHAT vdb-entry
- RHBZ#2345857 issue-tracking x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2024-45781 x_refsource_REDHAT vdb-entry
- RHBZ#2345857 issue-tracking x_refsource_REDHAT
- RHSA-2025:6990 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2024-45781 x_refsource_REDHAT vdb-entry
- RHBZ#2345857 issue-tracking x_refsource_REDHAT
- RHSA-2025:6990 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2024-45781 x_refsource_REDHAT vdb-entry
- RHBZ#2345857 issue-tracking x_refsource_REDHAT
- RHBZ#2345857 issue-tracking x_refsource_REDHAT
- RHSA-2025:6990 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2024-45781 x_refsource_REDHAT vdb-entry
- https://access.redhat.com/security/cve/CVE-2024-45781 x_refsource_REDHAT vdb-entry
- RHBZ#2345857 issue-tracking x_refsource_REDHAT
- RHSA-2025:16154 x_refsource_REDHAT vendor-advisory
- RHSA-2025:6990 x_refsource_REDHAT vendor-advisory
- RHBZ#2345857 issue-tracking x_refsource_REDHAT
- RHSA-2025:16154 x_refsource_REDHAT vendor-advisory
- RHSA-2025:6990 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2024-45781 x_refsource_REDHAT vdb-entry
- RHSA-2025:16154 x_refsource_REDHAT vendor-advisory
- RHSA-2025:6990 x_refsource_REDHAT vendor-advisory
- https://access.redhat.com/security/cve/CVE-2024-45781 x_refsource_REDHAT vdb-entry
- RHBZ#2345857 issue-tracking x_refsource_REDHAT
Affected products
grub2
- =<2.12
- *
rhcos
Matching in nixpkgs
pkgs.grub2_pvgrub_image
PvGrub2 image for booting PV Xen guests
pkgs.grub2_pvhgrub_image
PvGrub2 image for booting PVH Xen guests
Package maintainers
-
@hehongbo Hongbo
-
@CertainLach Yaroslav Bolyukin <iam@lach.pw>
-
@SigmaSquadron Fernando Rodrigues <alpha@sigmasquadron.net>