Untriaged
Permalink
CVE-2024-45778
4.1 MEDIUM
- CVSS version: 3.1
- Attack vector (AV): LOCAL
- Attack complexity (AC): HIGH
- Privileges required (PR): HIGH
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): NONE
- Integrity impact (I): NONE
- Availability impact (A): HIGH
Grub2: fs/bfs: integer overflow in the bfs parser.
A stack overflow flaw was found when reading a BFS file system. A crafted BFS filesystem may lead to an uncontrolled loop, causing grub2 to crash.
References
- https://access.redhat.com/security/cve/CVE-2024-45778 x_refsource_REDHAT vdb-entry
- RHBZ#2345640 issue-tracking x_refsource_REDHAT
- RHBZ#2345640 issue-tracking x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2024-45778 x_refsource_REDHAT vdb-entry
- https://access.redhat.com/security/cve/CVE-2024-45778 x_refsource_REDHAT vdb-entry
- RHBZ#2345640 issue-tracking x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2024-45778 x_refsource_REDHAT vdb-entry
- RHBZ#2345640 issue-tracking x_refsource_REDHAT
- RHBZ#2345640 issue-tracking x_refsource_REDHAT
- https://access.redhat.com/security/cve/CVE-2024-45778 x_refsource_REDHAT vdb-entry
Affected products
grub2
- =<2.12
rhcos
Matching in nixpkgs
pkgs.grub2_pvgrub_image
PvGrub2 image for booting PV Xen guests
pkgs.grub2_pvhgrub_image
PvGrub2 image for booting PVH Xen guests
Package maintainers
-
@hehongbo Hongbo
-
@CertainLach Yaroslav Bolyukin <iam@lach.pw>
-
@SigmaSquadron Fernando Rodrigues <alpha@sigmasquadron.net>